Zer0Mem0ry / Detour
A simple project to demonstrate function hooking / detouring
☆126Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Detour
- C++17 PE manualmapper☆248Updated 3 years ago
- ☆159Updated 7 years ago
- RootKit & Cheat Scanner - Windows☆212Updated 5 years ago
- A simple program to demonstrate external signature scanning.☆69Updated 2 years ago
- Rendering on external windows via hijacking thread contexts☆378Updated 4 years ago
- driver mapper / capcom wrapper☆214Updated 5 years ago
- Windows kernel samples☆247Updated 5 years ago
- Module extending manual mapper☆307Updated 4 years ago
- Hooking kernel functions by abusing alignment☆238Updated 3 years ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆188Updated 7 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆238Updated 5 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆184Updated 4 years ago
- Elevate a process to be a protected process☆142Updated 5 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆244Updated 4 years ago
- Kernel mode driver for reading/writing process memory. C/Win32.☆276Updated 6 years ago
- A Simple demonstration of manual dll injector☆203Updated 3 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆438Updated 5 years ago
- Detect manualmapped images remotely, without hassle☆155Updated 7 years ago
- BattlEye compatible injector, done completely from user-mode, project by secret.club☆238Updated 4 years ago
- Simple benchmark for findpattern implementations.☆155Updated 6 months ago
- A library to manipulate physical memory from usermode.☆291Updated last year
- Simple code to manipulate the memory of a usermode process from kernel.☆273Updated 8 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆141Updated 6 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆282Updated 6 years ago
- A customizable process dumper.☆128Updated 5 years ago
- Kernel Inject DLL☆343Updated last year
- Manual DLL Injector using Thread Hijacking.☆231Updated 6 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆160Updated 4 years ago
- Windows driver for spoofing serial number of HDDs☆207Updated 2 years ago