Rat431 / EAC_EmuLinks
A simple EasyAntiCheat x64 emulator.
☆48Updated 6 years ago
Alternatives and similar repositories for EAC_Emu
Users that are interested in EAC_Emu are comparing it to the libraries listed below
Sorting:
- Just my first IOCTL try☆75Updated 5 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- ☆42Updated 6 years ago
- A simple kernel-level plugin for ReClass.NET☆37Updated 7 years ago
- Apex Legends QEMU Cheat☆54Updated 5 years ago
- Unpacking VMProtected Executable Guide☆121Updated 5 years ago
- ☆50Updated 6 years ago
- ☆106Updated 2 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 5 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆82Updated 4 years ago
- game dumper☆46Updated 5 years ago
- Detect if a mouse event injected☆39Updated 8 years ago
- Communication via callback☆74Updated 6 years ago
- A simple bypass for Steam's `ThreadHideFromDebugger` anti-debugging technique.☆40Updated 5 years ago
- ☆66Updated 6 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- A simple open source memory hooking library for Windows x86/x64☆88Updated 5 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆42Updated 5 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆101Updated 5 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- ☆38Updated 8 years ago
- driver manual mapper☆27Updated 5 years ago
- ☆51Updated 5 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆105Updated 2 years ago
- A simple open source module injector library x86/x64 for Windows☆22Updated 5 years ago
- External mid-function hooking method to retrieve register data☆92Updated 7 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆67Updated 2 years ago
- disable most common windowsx64 systems patchguard☆86Updated 6 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆116Updated 7 years ago