hrt / ThreadJect-x64Links
Manual DLL Injector using Thread Hijacking. X64
☆35Updated 6 years ago
Alternatives and similar repositories for ThreadJect-x64
Users that are interested in ThreadJect-x64 are comparing it to the libraries listed below
Sorting:
- ☆63Updated 2 years ago
- ☆141Updated last year
- working injector bp (BE EAC & VANGUARD)☆36Updated 2 years ago
- Kernel driver that moves the mouse☆70Updated 3 months ago
- csgo external running from kernelmode☆108Updated 2 years ago
- ☆49Updated 5 years ago
- ☆50Updated last year
- Iterate FUObjectArray->ObjObjects & FNamePool->Entries☆39Updated 3 years ago
- APEX Full internal Cheat☆66Updated 5 years ago
- I've developed a rather effective driver for DLL injection targeting EAC Protected Games, and since I'm not aware of any notable games ut…☆91Updated last year
- Based on physmeme☆69Updated 3 years ago
- DWM overlay without pattern scanning☆44Updated 3 weeks ago
- Known ring3 memory protections that can be handled at a simple level.☆65Updated 2 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆94Updated 3 years ago
- game dumper☆46Updated 4 years ago
- ☆83Updated last year
- Helps to find patched modules☆29Updated 4 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆51Updated 3 years ago
- Just my first IOCTL try☆74Updated 4 years ago
- ☆80Updated 3 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- ☆36Updated 3 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 6 years ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆100Updated last year
- External Il2Cpp Framework☆60Updated 3 years ago
- Intercept ProcessEvent calls on any game object (Unreal Engine 4)☆48Updated 3 years ago
- This tool Decrypt and Extract the files from the EAC☆66Updated 2 years ago
- ☆67Updated last year
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆62Updated last year
- bypass to the p2c(s) that I have run over the past few months.☆51Updated 2 years ago