alexpsp00 / x-elite.net-loaderLinks
P2C Loader based on blackbone, used by isolation.top and others.
☆13Updated 7 years ago
Alternatives and similar repositories for x-elite.net-loader
Users that are interested in x-elite.net-loader are comparing it to the libraries listed below
Sorting:
- ☆14Updated 7 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆24Updated 10 months ago
- Some crazy PE executables protection kernel driver☆20Updated 5 years ago
- External cheat base with DirectX overlay☆20Updated 7 years ago
- driver interface with dll-injection capabilities☆28Updated 5 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆25Updated 8 years ago
- (shard of furikuri project) assambler for code obfuscation☆19Updated 6 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Updated 5 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 8 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- New handle stealing technique for windows apps☆13Updated 8 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27Updated 11 years ago
- ☆12Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Updated 8 years ago
- easy to use vtable hook with RTTI support☆23Updated 6 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Updated 11 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Updated 6 years ago
- Shareds for kernel developement☆29Updated 12 years ago
- A tool to dump informations about the caller of a function.☆13Updated 9 years ago
- Kernel Inject Process☆11Updated 8 years ago
- win32/x64 obfuscate framework☆33Updated 6 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Updated 7 years ago
- Wow64 syscall hook☆42Updated 8 years ago
- ☆28Updated 8 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆25Updated 8 years ago
- ☆15Updated last year
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 7 years ago