Compile-Time Calls Obfuscator for C++14+
☆52Dec 7, 2023Updated 2 years ago
Alternatives and similar repositories for crycall
Users that are interested in crycall are comparing it to the libraries listed below
Sorting:
- Compile-Time Strings and Numbers Encryption for C++20☆59Feb 9, 2025Updated last year
- Its a header-only runtime tool for importing functions from modules.☆45Mar 20, 2023Updated 2 years ago
- GDI Render in kernelmode☆10Mar 7, 2020Updated 5 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- ☆17Dec 18, 2022Updated 3 years ago
- ☆193May 1, 2023Updated 2 years ago
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆168Oct 27, 2025Updated 4 months ago
- PAGE_GUARD based hooking library☆52Jul 25, 2022Updated 3 years ago
- Bootkits☆19Sep 13, 2023Updated 2 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- Calling "own" MouseClassServiceCallback☆76Jul 28, 2022Updated 3 years ago
- ☆23May 8, 2023Updated 2 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- A method to Disable DSE using .data ptr hooks☆38Feb 1, 2024Updated 2 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- ☆183May 20, 2022Updated 3 years ago
- An anti-cheat project that includes kernel mode.☆39Jul 29, 2021Updated 4 years ago
- undetected eac mapper☆170May 3, 2022Updated 3 years ago
- noob hooking dwm for overlay☆84Nov 24, 2020Updated 5 years ago
- A simple way to spoof return addresses using an exception handler☆43Aug 3, 2022Updated 3 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Jul 5, 2023Updated 2 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- 热门网络游戏辅助开发教程☆19May 27, 2021Updated 4 years ago
- Finished source of my fortnite cheat.☆22Jan 9, 2023Updated 3 years ago
- LLVM fork with explicit compatibility with MSVC 2022 features.☆383Feb 14, 2026Updated 2 weeks ago
- ☆63Sep 28, 2022Updated 3 years ago
- ☆28Aug 3, 2024Updated last year
- 保护进程☆24Apr 4, 2023Updated 2 years ago
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated last year
- ☆19Apr 14, 2023Updated 2 years ago
- ☆29Mar 9, 2024Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- Allocation-free move-only alternative to std::function for C++17☆12Feb 6, 2021Updated 5 years ago
- DRM Library for Windows (x64) in C++☆29Oct 15, 2025Updated 4 months ago