JackBro / BetaShield
BetaShield Windows x86 Ring3 Anticheat v2
☆34Updated 7 years ago
Related projects: ⓘ
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆53Updated 4 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆42Updated 5 years ago
- Some garbage drivers written for getting started☆62Updated 4 years ago
- x64 manual mapper using inline syscalls☆6Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 5 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆63Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆54Updated 4 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆51Updated 2 years ago
- ☆53Updated this week
- ☆47Updated 5 years ago
- ☆76Updated 3 years ago
- scans through physical memory and paging tables in kernel mode☆104Updated 3 years ago
- ☆50Updated this week
- A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory…☆55Updated 3 years ago
- ☆36Updated 7 years ago
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆57Updated 5 years ago
- ☆28Updated this week
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆62Updated last year
- Communication via callback☆69Updated 4 years ago
- ☆59Updated this week
- ☆42Updated 2 years ago
- ☆24Updated this week
- Helps to find patched modules☆26Updated 3 years ago
- Detect removed thread from PspCidTable.☆67Updated 2 years ago
- ☆37Updated this week
- Mapping your code on a 0x1000 size page☆66Updated 2 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- ☆45Updated 3 years ago
- ☆62Updated this week
- Memory Guard Library☆9Updated 3 years ago