Rat431 / EAC_EmuLinks
A simple EasyAntiCheat x64 emulator.
☆47Updated 6 years ago
Alternatives and similar repositories for EAC_Emu
Users that are interested in EAC_Emu are comparing it to the libraries listed below
Sorting:
- Just my first IOCTL try☆75Updated 5 years ago
- A simple open source module injector library x86/x64 for Windows☆21Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆105Updated 4 years ago
- game dumper☆47Updated 4 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 5 years ago
- A simple open source memory hooking library for Windows x86/x64☆87Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- ☆100Updated last year
- Communication via callback☆72Updated 5 years ago
- dx9 logger imgui hack☆21Updated 4 years ago
- A simple kernel-level plugin for ReClass.NET☆36Updated 7 years ago
- ☆41Updated 6 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆93Updated 5 years ago
- ☆42Updated 6 years ago
- ☆50Updated 6 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- Unpacking VMProtected Executable Guide☆119Updated 5 years ago
- Detect if a mouse event injected☆39Updated 8 years ago
- ☆38Updated 8 years ago
- BattlEye BEClient<->BEService usermode emulator☆83Updated 5 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- Apex Legends QEMU Cheat☆54Updated 5 years ago
- Disable Driver Callbacks☆104Updated 7 years ago
- Internal (DLL) hack for Sea of Thieves. Also a good Base for an Internal hack for any UE4 game.☆55Updated 6 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆70Updated 6 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆112Updated 7 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆67Updated 2 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆93Updated 5 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆43Updated 5 years ago