huoji120 / EACReversing
Reversing EasyAntiCheat.
☆32Updated 6 years ago
Alternatives and similar repositories for EACReversing:
Users that are interested in EACReversing are comparing it to the libraries listed below
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆68Updated 3 years ago
- ☆80Updated 3 years ago
- ☆55Updated 2 years ago
- InjectDll☆55Updated 6 years ago
- ☆45Updated 6 years ago
- 收集常用windows版本内核文件☆31Updated last year
- Hook system calls, context switches, page faults and more.☆34Updated 5 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- ☆43Updated 7 months ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- ☆52Updated 2 years ago
- ☆35Updated 6 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆106Updated 2 years ago
- ☆68Updated 3 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆41Updated 11 months ago
- first commit☆60Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated 2 years ago
- ☆132Updated 2 years ago
- A Memory Read And Write the Hide Driver☆66Updated 4 years ago
- VT Hook☆46Updated 9 months ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆85Updated 3 weeks ago
- 使用vt进行无痕hook,支持r3☆54Updated 6 years ago
- This is an extension to InfinityHookPro to support physical machine environments. (Win7 -> Win11 latest)☆32Updated 2 years ago
- Intel Virtualization Technology demo☆65Updated 8 years ago
- PTE hook☆19Updated 10 months ago
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆45Updated 5 years ago
- 模仿PCHUNTER的ARK工具☆38Updated 5 years ago
- ☆110Updated 5 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆81Updated 6 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆49Updated 3 years ago