Ricardonacif / steam-loader
A simple bypass for Steam's `ThreadHideFromDebugger` anti-debugging technique.
☆39Updated 4 years ago
Alternatives and similar repositories for steam-loader:
Users that are interested in steam-loader are comparing it to the libraries listed below
- Global DLL injector☆66Updated 3 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆79Updated 4 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- ☆35Updated 4 years ago
- ☆30Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- battleye shellcode☆18Updated 5 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆82Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆14Updated 3 years ago
- x64 manual mapper using inline syscalls☆8Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- Helps to find patched modules☆29Updated 4 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆59Updated 4 years ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆31Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Ironsight Internal Multihack☆38Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆68Updated 2 years ago
- ☆37Updated 7 years ago
- ☆45Updated 4 years ago
- A lightweight BattlEye emulator of the launcher☆60Updated 2 years ago
- ☆29Updated 3 years ago
- Communication via callback☆73Updated 5 years ago
- Bypassing EAC integrity checks by abusing a TOCTOU in Dead by Daylight.☆20Updated 4 years ago
- ☆22Updated 10 months ago