VariantXYZ / ws_interceptLinks
A simple hook into ws2_32.dll's send and receive functions that supports plugins to process/modify packets.
☆69Updated 2 years ago
Alternatives and similar repositories for ws_intercept
Users that are interested in ws_intercept are comparing it to the libraries listed below
Sorting:
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆123Updated 8 years ago
- I wanted a nicer signature scanner that worked the way I wanted. Include however you want in your own DLL project.☆45Updated last month
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Updated 8 years ago
- hooking winsock send & recv in order to read all traffic of a process☆49Updated 7 years ago
- Capcom driver exploit wrapper☆128Updated 6 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- x86/x64 manual mapping injector using the JUCE library☆87Updated 5 years ago
- A plugin to x64dbg that lets you find out what writes to/accesses particular address☆116Updated 4 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆116Updated 7 years ago
- PoC: make WDA_MONITOR window transparent on screenshot/capture☆100Updated 5 years ago
- KDMAPPER build [1809,1903,1909,2004]☆74Updated 5 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- Hard Disk Serial Number Spoofer on windows. x86/x64 supported.☆79Updated 8 years ago
- Basic example of how to change the initial rights on a memory region during runtime.☆43Updated 2 years ago
- External mid-function hooking method to retrieve register data☆92Updated 7 years ago
- driver mapper / capcom wrapper☆225Updated 6 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Updated 7 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆147Updated 7 years ago
- Add More Features for x64dbg Script System,with some Functions which will help Plugin Coder☆128Updated 3 years ago
- A simple open source memory hooking library for Windows x86/x64☆87Updated 5 years ago
- An usermode alternative for DuplicateHandle.☆176Updated 8 years ago
- Handle access elevation via direct kernel object manipulation☆118Updated 7 years ago
- OpenSSL hooking☆63Updated 11 years ago
- Test code only. Not suitable for actual use.☆97Updated 10 years ago
- ☆171Updated 8 years ago
- ☆50Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Updated 8 years ago
- ☆59Updated 6 years ago
- Virtual Method Table Hook☆58Updated 2 years ago
- Disable Driver Callbacks☆104Updated 8 years ago