byte2mov / anti-breakpoint
anti breakpoint using job objects in a simple way.
☆12Updated 9 months ago
Alternatives and similar repositories for anti-breakpoint:
Users that are interested in anti-breakpoint are comparing it to the libraries listed below
- Loader base source using keyauth made by me with basic protection, u can use it as a base for your spoofer/cheat loader☆27Updated 4 months ago
- manual mapping injector☆26Updated 2 years ago
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- Written in a couple hours, don't judge :)☆14Updated last year
- RWX Section Abusing☆18Updated last year
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Updated last year
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Hardware ID☆24Updated 2 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆28Updated 5 months ago
- Header only UM AC "bypass"☆17Updated 8 months ago
- stop any process from looking into your process by hooking.☆16Updated 9 months ago
- A simple MmCopyMemory hook.☆36Updated 2 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆31Updated 9 months ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆12Updated 3 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆42Updated last year
- ☆16Updated 9 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆28Updated 2 months ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ntoskrnl .data hooks for UM-KM communication