MatrixKung / BottlEye
BottlEye is a usermode emulator for the popular anti-cheat BattlEye
☆8Updated 4 years ago
Alternatives and similar repositories for BottlEye:
Users that are interested in BottlEye are comparing it to the libraries listed below
- ☆41Updated 5 years ago
- ☆48Updated 5 years ago
- x64 manual mapper using inline syscalls☆7Updated 3 years ago
- A mini anti-anti debug hooking library for Windows.☆105Updated 4 years ago
- Pointer search for any classes using the RTTI feature.☆48Updated 4 years ago
- Usermode emulation of x64 EAC☆28Updated 3 years ago
- Detect if a mouse event injected☆39Updated 7 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- A simple open source memory hooking library for Windows x86/x64☆88Updated 4 years ago
- Windows Kernel Driver dlls injector using APC☆58Updated 6 years ago
- A lightweight BattlEye emulator of the launcher☆58Updated 2 years ago
- memflow plugin for ReClass.NET☆20Updated 6 months ago
- Bypassing EAC integrity checks by abusing a TOCTOU in Dead by Daylight.☆19Updated 4 years ago
- x64 syscall caller in C++.☆85Updated 6 years ago
- ☆22Updated 8 months ago
- A simple EasyAntiCheat x64 emulator.☆47Updated 5 years ago
- ☆32Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆66Updated 5 years ago
- ☆36Updated 3 years ago
- KDMAPPER build [1809,1903,1909,2004]☆69Updated 4 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆67Updated 5 years ago
- Hacky way of protecting a value in memory in C++. Uses various anti-debugging techniques (x86 only).☆48Updated 7 years ago
- ☆33Updated 2 years ago
- A simple program to demonstrate external signature scanning.☆69Updated 2 years ago
- A C# (.NET 8) wrapper for the memflow-ffi crate☆12Updated 7 months ago
- Disable Driver Callbacks☆102Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆25Updated 3 years ago