haram / watermark_disablerLinks
disables the 'Activate Windows' watermark.
☆4Updated 5 years ago
Alternatives and similar repositories for watermark_disabler
Users that are interested in watermark_disabler are comparing it to the libraries listed below
Sorting:
- Pointer search for any classes using the RTTI feature.☆50Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- Just my first IOCTL try☆74Updated 5 years ago
- hwid-checker-mg is simple, proof-of-concept, hardware id checker made in C++ that utilizes the SMBIOS/DMI standards to output information…☆107Updated 3 years ago
- A mini anti-anti debug hooking library for Windows.☆108Updated 4 years ago
- A simple open source memory hooking library for Windows x86/x64☆88Updated 4 years ago
- Bypassing EAC integrity checks by abusing a TOCTOU in Dead by Daylight.☆20Updated 4 years ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆31Updated 3 years ago
- ☆50Updated 6 years ago
- Linux EAC reversal (.so)☆23Updated 6 years ago
- ☆41Updated 5 years ago
- ☆33Updated 7 years ago
- Apex Legends QEMU Cheat☆55Updated 5 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- A simple EasyAntiCheat x64 emulator.☆47Updated 5 years ago
- ☆38Updated 8 years ago
- This tool Decrypt and Extract the files from the EAC☆66Updated 2 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆100Updated 4 years ago
- ☆66Updated 5 years ago
- BattlEye BEClient<->BEService usermode emulator☆83Updated 5 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆78Updated last year
- A small wrapper class providing an unified interface to search for various memory signatures☆80Updated 3 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆67Updated 6 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆112Updated 7 years ago
- ☆24Updated last year
- Intercepting DeviceControl via WPP☆134Updated 5 years ago
- Helps to find patched modules☆29Updated 4 years ago
- Capcom driver exploit wrapper☆124Updated 6 years ago
- Hacky way of protecting a value in memory in C++. Uses various anti-debugging techniques (x86 only).☆51Updated 8 years ago
- A simple kernel-level plugin for ReClass.NET☆36Updated 7 years ago