TheDarkEngine / DarkCoreLinks
Static DLL Patching and Hooking System
☆25Updated 10 years ago
Alternatives and similar repositories for DarkCore
Users that are interested in DarkCore are comparing it to the libraries listed below
Sorting:
- xLCB plugin for x64dbg☆20Updated 9 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24Updated 15 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Using Deviare to Cheat on Games: Intercepting Direct3D COM objects and making walls invisible☆13Updated 12 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- OllySocketTrace is a plugin for OllyDbg to trace the socket operations being performed by a process.☆63Updated 14 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Updated 2 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Updated 5 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Updated 7 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 10 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆11Updated 12 years ago
- IDA recompiler☆31Updated 11 years ago
- ☆30Updated 8 years ago
- Game Hacking Adventures Scripts & Tools☆20Updated 12 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆34Updated 13 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 8 years ago
- Simple standalone bundle of NT core APIs☆25Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Provides the ability to patch/hook functions imported by a dll or executable☆35Updated 15 years ago
- command-line interface dll injector☆53Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆29Updated 11 years ago
- ☆52Updated 9 years ago
- Remote execution tool☆14Updated 11 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- ☆32Updated 3 years ago