armasm / game-hackingLinks
Tutorials, tools, and more as related to reverse engineering video games.
☆32Updated 6 years ago
Alternatives and similar repositories for game-hacking
Users that are interested in game-hacking are comparing it to the libraries listed below
Sorting:
- ☆100Updated last year
- noob hooking dwm for overlay☆83Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- A Memory Read And Write the Hide Driver☆69Updated 4 years ago
- ☆52Updated last year
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆36Updated 3 years ago
- ☆55Updated 2 years ago
- ☆46Updated 3 years ago
- ☆47Updated 4 years ago
- Hiding a system thread against conventional means of detection☆41Updated 4 years ago
- ☆138Updated 2 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆89Updated 6 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆49Updated 4 years ago
- i stole this from some guys private repo on github☆57Updated 4 years ago
- ☆48Updated 3 years ago
- ☆69Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆93Updated 5 years ago
- Calling "own" MouseClassServiceCallback☆70Updated 3 years ago
- Detect removed thread from PspCidTable.☆74Updated 3 years ago
- 热门网络游戏辅助开发教程☆20Updated 4 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆95Updated 3 years ago
- Discarded Section Manual Map☆69Updated 5 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- Windows Kernel Misc☆23Updated last year
- 将驱动映射到会话空间☆35Updated 3 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆42Updated 3 years ago
- ☆21Updated 3 years ago
- POC usermode <=> kernel communication via ALPC.☆63Updated last year