huoji120 / battleyeLinks
battleye shellcode
☆18Updated 5 years ago
Alternatives and similar repositories for battleye
Users that are interested in battleye are comparing it to the libraries listed below
Sorting:
- ☆36Updated 5 years ago
- ☆47Updated 4 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- Old way for blocking NMI interrupts☆26Updated 2 years ago
- ☆18Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Updated 5 years ago
- ☆72Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- ☆32Updated 2 years ago
- detect hypervisor with Nmi Callback☆38Updated 2 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Modmap updated to work on Windows 11☆28Updated 3 years ago
- A Simple Example☆21Updated 6 years ago
- Discarded Section Manual Map☆68Updated 5 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- 将驱动映射到会话空间☆35Updated 2 years ago
- https://githacks.org/Shawick/goodeye.git☆50Updated 4 years ago
- Helps to find patched modules☆29Updated 4 years ago
- ☆22Updated 3 years ago
- ☆25Updated last year
- ☆14Updated 4 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- page table manipulation to gain physical r/w☆42Updated last year
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- ☆46Updated 3 years ago