KANKOSHEV / ValorantExternalLinks
Bypass valorant page guard external
☆22Updated 4 years ago
Alternatives and similar repositories for ValorantExternal
Users that are interested in ValorantExternal are comparing it to the libraries listed below
Sorting:
- ☆41Updated 2 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆46Updated 3 years ago
- ☆42Updated 3 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- ☆47Updated 4 years ago
- ☆32Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- Old way for blocking NMI interrupts☆27Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆72Updated last year
- ☆14Updated 2 years ago
- A simple way to spoof return addresses using an exception handler☆32Updated 2 years ago
- ☆81Updated 3 years ago
- ☆46Updated 3 years ago
- Helps to find patched modules☆29Updated 4 years ago
- ☆18Updated 3 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- detect hypervisor with Nmi Callback☆39Updated 2 years ago
- ☆74Updated 2 years ago
- Decrypts multiple BattlEye packets from BEService<>BEDaisy (including those with multiple encryption layers) out to a console.☆25Updated 3 years ago
- A simple present scene, kernel allocation injector.☆24Updated 3 years ago
- ☆42Updated 3 years ago
- ☆32Updated 2 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆42Updated 4 years ago
- ☆50Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago