SrShadowy / MemoryScannerLinks
Scan Like a Cheat Engine
☆29Updated 6 years ago
Alternatives and similar repositories for MemoryScanner
Users that are interested in MemoryScanner are comparing it to the libraries listed below
Sorting:
- ☆27Updated 8 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- old bypass☆34Updated 7 years ago
- ☆35Updated 5 years ago
- Modify process handle permissions☆61Updated 9 years ago
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆17Updated 8 months ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- eac memory sig maker☆13Updated 4 years ago
- APC注入DLL内核层☆23Updated 7 years ago
- PUBG Lite SDK External Generator, base on KN4CK3R's UnrealEngineSDKGenerator.☆10Updated 5 years ago
- ☆35Updated 6 years ago
- ☆18Updated 5 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆53Updated 4 years ago
- Another method to anti ThreadHideFromDebugger☆37Updated 6 years ago
- The driver STL library used by myself☆13Updated 3 years ago
- APEX-EACBypass(usermode)☆47Updated 6 years ago
- Windows Kernel nt files - To research windows kernel☆15Updated 5 years ago
- get ntdll syscall index☆12Updated 5 years ago
- ☆48Updated 5 years ago
- ☆14Updated 3 years ago
- ☆14Updated 4 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Updated 5 years ago
- ☆13Updated 5 years ago
- ☆14Updated 4 years ago
- simply manual map any system image☆18Updated 4 years ago
- ☆28Updated 5 years ago
- ☆48Updated 7 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Updated 4 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆67Updated 6 years ago