gfreivasc / VMTHookLinks
Virtual Method Table Hook
☆58Updated 2 years ago
Alternatives and similar repositories for VMTHook
Users that are interested in VMTHook are comparing it to the libraries listed below
Sorting:
- A small wrapper class providing an unified interface to search for various memory signatures☆80Updated 3 years ago
- Pointer search for any classes using the RTTI feature.☆50Updated 4 years ago
- External mid-function hooking method to retrieve register data☆90Updated 6 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- Communication via callback☆73Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆107Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆67Updated 6 years ago
- ☆49Updated 6 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆84Updated 4 years ago
- ☆38Updated 8 years ago
- A simple program to demonstrate external signature scanning.☆69Updated 3 years ago
- hwid-checker-mg is simple, proof-of-concept, hardware id checker made in C++ that utilizes the SMBIOS/DMI standards to output information…☆107Updated 3 years ago
- C++ 17 compile time string encryption supporting vs2010-2019☆75Updated 5 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆106Updated last year
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Updated 6 years ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆196Updated 7 years ago
- A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory…☆58Updated 4 years ago
- ☆168Updated 7 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- Capcom wrapper with safety in mind.☆80Updated 7 years ago
- Just my first IOCTL try☆74Updated 4 years ago
- The most powerful and customizable binary pattern scanner☆238Updated 3 years ago
- ☆73Updated 5 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆77Updated last year
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- ayy debuger☆89Updated last year
- Intercepting DeviceControl via WPP☆134Updated 5 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆124Updated 3 years ago
- Apex Legends QEMU Cheat☆55Updated 5 years ago