Kirbiflint50 / KirbiDSMx64-OPSLinks
Open Source 64 bit disassembler for Windows
☆23Updated 6 years ago
Alternatives and similar repositories for KirbiDSMx64-OPS
Users that are interested in KirbiDSMx64-OPS are comparing it to the libraries listed below
Sorting:
- A Windows game hacking framework☆43Updated 8 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆21Updated 4 months ago
- x64 Driver written in FASM☆24Updated 8 years ago
- MIR-Engine☆24Updated 7 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- Use the Cheat Engine driver in your own process!☆22Updated 6 years ago
- basic dll injector using Qt☆20Updated 8 years ago
- Analyze PatchGuard☆58Updated 6 years ago
- A simple library which provides a way to read and write the memory of other processes☆51Updated 7 years ago
- x64dbg plugin - AttachHelper☆21Updated 8 years ago
- Plugin to label PEB addresses.☆31Updated 8 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Simple program for static hooking dynamic libraries in executable application☆22Updated 11 years ago
- My take on the capcom driver vulnerability☆28Updated 7 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆77Updated 14 years ago
- easy to use vtable hook with RTTI support☆23Updated 5 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- XEDParse emulator based on asmjit/asmtk.☆22Updated last year
- PE Library x86☆21Updated 5 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Manual PE image mapper☆65Updated 11 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- A Repository with all Things GameHacking.☆28Updated 6 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆53Updated 8 years ago
- ☆32Updated 8 years ago