Zer0Mem0ry / FlagEditor
☆14Updated 8 years ago
Alternatives and similar repositories for FlagEditor:
Users that are interested in FlagEditor are comparing it to the libraries listed below
- A simple program to scan for open handles in a process.☆62Updated 8 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- Dll injector POC for new handle stealing technique☆20Updated 7 years ago
- Use the Cheat Engine driver in your own process!☆22Updated 6 years ago
- ☆9Updated 8 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- Recreation of GetProcAddress without external dependencies on Windows Libraries☆89Updated 9 years ago
- Manual PE image mapper☆63Updated 11 years ago
- Open Source 64 bit disassembler for Windows☆23Updated 6 years ago
- A sample on how to inject a DLL from a kernel driver☆61Updated 8 years ago
- A simple program that uses an overlapping window to create a melting screen effect.☆41Updated 8 years ago
- small little public internal base/cheat i'm currently working on☆25Updated 5 years ago
- a Simple CRC32 hash algorithm☆14Updated 8 years ago
- Small memory leak PoC that is happening in IopGetDeviceInterfaces☆24Updated 4 years ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆86Updated 8 years ago
- ☆37Updated 7 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆76Updated last year
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆19Updated 3 weeks ago
- Open source Anti Debug methods to use for your games. This uses SAC as an example. Will be sure to update it and / or add new features in…☆18Updated 4 years ago
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆32Updated 10 years ago
- Hiding x32/x64 Modules/DLLs using PEB☆62Updated 9 years ago
- BetaShield Windows x86 Ring3 Anticheat v2☆38Updated 8 years ago
- Crash Windows 10 up to RS2 from an unprivileged process☆41Updated 7 years ago
- ☆10Updated 3 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- Hacky way of protecting a value in memory in C++. Uses various anti-debugging techniques (x86 only).☆50Updated 8 years ago
- A simple program to demonstrate external signature scanning.☆68Updated 2 years ago
- Disable Driver Callbacks☆102Updated 7 years ago
- Reading/writing memory from kernel-mode☆23Updated 7 years ago
- ☆19Updated 2 years ago