NewWorldComingSoon / UnknownField
UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.
☆44Updated 2 years ago
Alternatives and similar repositories for UnknownField:
Users that are interested in UnknownField are comparing it to the libraries listed below
- A poc that abuses Enclave☆36Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- ☆27Updated 2 years ago
- windows kernel pagehook☆38Updated 2 years ago
- ☆24Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- Open Anti Cheat☆27Updated 2 years ago
- neat way to detect memory read using nt layer function.☆14Updated last year
- manual mapping injector☆28Updated 2 years ago
- ☆32Updated last year
- Only for Stress-Testing☆23Updated 2 years ago
- Windows Research Kernel VS2022 Solution☆28Updated 4 months ago
- x64 assembler library☆32Updated 7 months ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆42Updated last year
- intel vt-x hypervisor ept☆25Updated 4 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆30Updated 3 months ago
- Wow64 Heaven's Gate Hook☆28Updated 3 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆41Updated last year
- ☆23Updated last year
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- VT调试器插件搭配的CE☆21Updated 2 years ago
- https://githacks.org/Shawick/goodeye.git☆46Updated 4 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Protected Process Light Library☆18Updated 4 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- Black Signature Driver☆22Updated last year
- Bypassing kernel patch protection runtime☆19Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago