eac memory sig maker
☆14Jun 10, 2021Updated 4 years ago
Alternatives and similar repositories for EasyAntiCheatMemorySig
Users that are interested in EasyAntiCheatMemorySig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)☆17Mar 30, 2020Updated 5 years ago
- x64 Kernel Hooks Detection☆24Jan 1, 2017Updated 9 years ago
- hook detector☆31Nov 4, 2021Updated 4 years ago
- A simple anti-crack system☆21Jan 12, 2022Updated 4 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- Passthrough anti-cheat with this kernel-driver based on guided hacking tutorial☆11Oct 28, 2021Updated 4 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Mono process injector☆22Jan 26, 2019Updated 7 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- a free vt-x&ept debugger☆43May 11, 2021Updated 4 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆87Apr 3, 2019Updated 6 years ago
- A Rust library for function hooking that supports both 32 and 64 bit☆17Aug 1, 2021Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32May 18, 2022Updated 3 years ago
- DllInject (Memory Load)☆11Jan 5, 2019Updated 7 years ago
- ☆13Aug 24, 2022Updated 3 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- BattlEye x64 usermode injector☆66Mar 20, 2019Updated 7 years ago
- Tutorials, tools, and more as related to reverse engineering video games.☆32Sep 4, 2018Updated 7 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- LPC (Local Procedure Call) is a portion of Windows NT kernel, used for fast communication between threads or processes. It can be also us…☆15Mar 21, 2021Updated 5 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- https://www.youtube.com/watch?v=qsjGj_L1kyo☆10Jul 29, 2021Updated 4 years ago
- ☆11Sep 20, 2021Updated 4 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- 自己实现LoadLirbrary,GetProcAdd,FreeLirbrary等函数的功能,比特币病毒wcry就是用了这一功能☆18May 21, 2017Updated 8 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Stealing signatures from pe files☆15Apr 1, 2025Updated 11 months ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Oct 29, 2019Updated 6 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- ☆16Jun 20, 2022Updated 3 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- pepex hack☆10Oct 22, 2021Updated 4 years ago
- ☆18Sep 27, 2016Updated 9 years ago
- ☆12Oct 12, 2021Updated 4 years ago
- APEX Full internal Cheat☆62Apr 9, 2020Updated 5 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago