Shaxzy / VibranceInjectorLinks
Mono process injector
☆22Updated 6 years ago
Alternatives and similar repositories for VibranceInjector
Users that are interested in VibranceInjector are comparing it to the libraries listed below
Sorting:
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆23Updated 3 years ago
- ☆18Updated 4 years ago
- ☆49Updated 4 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆17Updated 4 years ago
- BitBlt color aimbot☆17Updated 6 years ago
- ☆51Updated last year
- Helps to find patched modules☆30Updated 5 years ago
- ☆22Updated 3 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 4 years ago
- ☆34Updated 5 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Updated 4 years ago
- ☆47Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Updated 3 years ago
- ☆28Updated 5 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆18Updated 5 years ago
- Simple memory obfuscator.☆24Updated 3 years ago
- working injector bp (BE EAC & VANGUARD)☆37Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ☆18Updated 3 years ago
- squad internal simple base☆16Updated last year
- ☆43Updated 4 years ago
- Old way for blocking NMI interrupts☆28Updated 3 years ago
- Stealing signatures from pe files☆14Updated 7 months ago
- mouseclassservicecallback detection via hook☆52Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆49Updated 4 years ago