cleverca22 / diablo_snifferLinks
An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass through a router. Uses libpcap and protobuf.
☆12Updated 12 years ago
Alternatives and similar repositories for diablo_sniffer
Users that are interested in diablo_sniffer are comparing it to the libraries listed below
Sorting:
- Today Plugin (x64) - A Plugin For x64dbg☆13Updated 6 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Updated 7 years ago
- modified version of reshade, using modules to have game-specifics behaviors☆11Updated 7 years ago
- ☆9Updated 8 years ago
- 파일시스템 미니필터 드라이버 (교육용 코드)☆6Updated 6 years ago
- an efficient yet easy to use network packet builder and parser☆11Updated 7 years ago
- A tiny library that lets you draw on Windows desktop.☆9Updated 8 years ago
- PC Game Modding☆10Updated 2 years ago
- ☆10Updated 5 years ago
- Lists work items being queued currently.☆14Updated 9 years ago
- 无聊写的玩☆7Updated 7 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- Graphics library in C++ for make keygen, patch, loader, etc.☆11Updated 10 years ago
- ☆7Updated 11 years ago
- HotS binary unpacker☆8Updated 9 years ago
- PE rebuilder, based on yoda's realigndll☆12Updated 13 years ago
- Minifilter Driver☆15Updated 8 years ago
- Windows NT Internal Structure☆5Updated 8 years ago
- wow64 syscall filter☆13Updated 10 years ago
- x64dbg plugin template for visual studio☆20Updated 6 years ago
- ☆10Updated 7 years ago
- Google Drive windows virtual unit☆9Updated 11 years ago
- Old and probably outdated IDA plugins☆24Updated 8 years ago
- An idea in hooking APIs by replacing calls that lead to them☆1Updated 2 years ago
- xLCB plugin for x64dbg☆20Updated 8 years ago
- Open-Source Anti-RMT-Spam Firewall☆12Updated 9 years ago
- Hides a DLL and associated files based on a FILE_TAG as a user-mode injected DLL.☆20Updated 11 years ago
- Tiny sandbox for my CodeProject Article☆6Updated 8 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- fork from http://hashlib.codeplex.com☆12Updated 7 years ago