huoji120 / EACReversingLinks
Reversing EasyAntiCheat.
☆32Updated 6 years ago
Alternatives and similar repositories for EACReversing
Users that are interested in EACReversing are comparing it to the libraries listed below
Sorting:
- ☆81Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 4 years ago
- ShotHv☆150Updated 3 years ago
- a monitoring windows driver calls kernel api tools☆124Updated last year
- InjectDll☆62Updated 7 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Updated 4 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- ☆51Updated last year
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆97Updated 2 years ago
- 硬件虚拟化☆60Updated 5 months ago
- first commit☆64Updated 5 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Updated 3 years ago
- an encryption library designed for Windows kernel and driver programming☆123Updated 2 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆54Updated 4 years ago
- VT Hook☆50Updated last year
- ☆102Updated 3 years ago
- noob hooking dwm for overlay☆83Updated 5 years ago
- ☆144Updated 3 years ago
- 收集常用windows版本内核文件☆35Updated 2 years ago
- ayy debuger☆89Updated last year
- ☆54Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆92Updated 6 years ago
- ☆69Updated 3 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Updated 5 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆113Updated 7 months ago
- A Memory Read And Write the Hide Driver☆72Updated 5 years ago
- ☆173Updated 3 years ago
- Hook system calls, context switches, page faults and more.☆34Updated 6 years ago
- a free vt-x&ept debugger☆42Updated 4 years ago