adi97ida / ClientLinks
☆12Updated 11 years ago
Alternatives and similar repositories for Client
Users that are interested in Client are comparing it to the libraries listed below
Sorting:
- Complete environement for network injected reversing☆21Updated 9 years ago
- My module injector for x86 (Capable of loading modules with both standard LoadLibraryA and ManualMap)☆22Updated 12 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 7 years ago
- DLL injector that bypasses some checks for valid certificates.☆37Updated 7 years ago
- D3D/DirectX Model recognition values for multiple games, used to create wallhack or chams☆24Updated 8 years ago
- ☆27Updated 8 years ago
- C++ POC Tool to inject process and RIP functions using NT SYSCALLS☆24Updated 8 years ago
- Spoof Windows Test Signing Mode☆29Updated 7 years ago
- paladins d3d multihack☆33Updated 2 years ago
- ☆60Updated 6 years ago
- MIR-Engine☆24Updated 8 years ago
- Mouse emulation driver for Windows 10 x64☆30Updated 8 years ago
- Modify process handle permissions☆61Updated 9 years ago
- A Windows driver used to facilitate DLL injection☆27Updated 8 years ago
- BattlEye x64 usermode injector☆66Updated 6 years ago
- Game Hacking / DirectX 9 GUI Library☆11Updated 7 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Updated 11 years ago
- ☆14Updated 8 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆25Updated last year
- My take on the capcom driver vulnerability☆28Updated 8 years ago
- Hidden module/dll detector for windows apps☆15Updated 8 years ago
- ☆14Updated 9 years ago
- ☆31Updated 7 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆15Updated 6 years ago
- Test code only. Not suitable for actual use.☆96Updated 10 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 11 years ago
- x86/x64 manual mapping injector using the JUCE library☆88Updated 5 years ago
- Example to execute code in a remote process using wndproc trick☆16Updated 8 years ago
- PE rebuilder, based on yoda's realigndll☆12Updated 14 years ago
- 反外挂带CRC校验☆26Updated 9 years ago