UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.
☆44Jan 21, 2023Updated 3 years ago
Alternatives and similar repositories for UnknownField
Users that are interested in UnknownField are comparing it to the libraries listed below
Sorting:
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Sep 3, 2023Updated 2 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Sep 6, 2021Updated 4 years ago
- A plugin for x64dbg.☆24Apr 25, 2021Updated 4 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- neat way to detect memory read using nt layer function.☆14Aug 4, 2023Updated 2 years ago
- ☆47Feb 3, 2025Updated last year
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆168Oct 27, 2025Updated 4 months ago
- Using ReadDirectoryChangesW to detect CheatEngine☆51Jun 7, 2022Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- VMPilot: A Modern C++ Virtual Machine SDK☆274Apr 2, 2025Updated 11 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆144Sep 3, 2023Updated 2 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- https://www.huorong.cn/☆15Apr 16, 2024Updated last year
- ☆17Apr 18, 2023Updated 2 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆29Aug 3, 2024Updated last year
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- RWX Section Abusing☆16Nov 19, 2023Updated 2 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- C/C++ Runtime library for system file (Windows Kernel Driver) - Supports Microsoft STL☆192Aug 27, 2022Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Dec 9, 2021Updated 4 years ago
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆43Apr 23, 2021Updated 4 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- 一个windows内核驱动分析框架,对内核所有导出函数进行挂钩监控☆69Nov 19, 2025Updated 3 months ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- ☆82Mar 20, 2022Updated 3 years ago
- an encryption library designed for Windows kernel and driver programming☆124Aug 4, 2023Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago