Ricardonacif / steam-loaderLinks
A simple bypass for Steam's `ThreadHideFromDebugger` anti-debugging technique.
☆39Updated 5 years ago
Alternatives and similar repositories for steam-loader
Users that are interested in steam-loader are comparing it to the libraries listed below
Sorting:
- Pointer search for any classes using the RTTI feature.☆49Updated 5 years ago
- VMP Mutation API Fix☆43Updated 3 years ago
- ☆50Updated 6 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆70Updated 6 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆96Updated 3 years ago
- Global DLL injector☆69Updated 4 years ago
- A simple EasyAntiCheat x64 emulator.☆47Updated 6 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆12Updated 5 years ago
- ☆30Updated 3 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- NT reversal☆26Updated 7 years ago
- ☆46Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆96Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- Ironsight Internal Multihack☆41Updated 2 years ago
- ☆33Updated 5 years ago
- ☆52Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- A simple open source memory hooking library for Windows x86/x64☆87Updated 4 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆70Updated 5 years ago
- A deobfuscator for overwatch's obfuscation.☆37Updated 4 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆106Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Communication via callback☆74Updated 5 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- A simple open source module injector library x86/x64 for Windows☆22Updated 5 years ago
- ☆50Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago