SrShadowy / MemoryScannerLinks
Scan Like a Cheat Engine
☆29Updated 6 years ago
Alternatives and similar repositories for MemoryScanner
Users that are interested in MemoryScanner are comparing it to the libraries listed below
Sorting:
- ☆27Updated 7 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆52Updated 4 years ago
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆16Updated 6 months ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆22Updated 5 years ago
- old bypass☆34Updated 7 years ago
- ☆33Updated 5 years ago
- APEX-EACBypass(usermode)☆47Updated 6 years ago
- APC注入DLL内核层☆25Updated 6 years ago
- 基于Intel-VT技术的windows内核增强型驱动☆29Updated 3 years ago
- ☆15Updated 2 years ago
- Windows Kernel nt files - To research windows kernel☆15Updated 5 years ago
- The driver STL library used by myself☆13Updated 2 years ago
- Modify process handle permissions☆60Updated 8 years ago
- PUBG Lite SDK External Generator, base on KN4CK3R's UnrealEngineSDKGenerator.☆10Updated 5 years ago
- Simulate SendInput with ClassService☆35Updated 7 years ago
- eac memory sig maker☆14Updated 4 years ago
- ☆35Updated 6 years ago
- hook system call that on user mode☆12Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- get ntdll syscall index☆12Updated 5 years ago
- ☆14Updated 5 years ago
- ☆18Updated 4 years ago
- ☆14Updated 4 years ago
- noob hooking dwm for overlay☆82Updated 4 years ago
- ☆28Updated 4 years ago
- Another method to anti ThreadHideFromDebugger☆36Updated 6 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆82Updated 6 years ago
- ☆80Updated 3 years ago
- Kernel mode to user mode injector☆11Updated 5 years ago