Known ring3 memory protections that can be handled at a simple level.
☆67Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for EasySafe
Users that are interested in EasySafe are comparing it to the libraries listed below
Sorting:
- comparing data of module exports from disk and memory, then caching any differences.☆26Dec 11, 2021Updated 4 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- Code for Battleyes shellcode☆239Nov 11, 2021Updated 4 years ago
- Helps to find patched modules☆30Oct 26, 2020Updated 5 years ago
- ☆36Mar 19, 2019Updated 6 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- A simple NtUserGetAsyncKeyState wrapper☆43Sep 28, 2022Updated 3 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- UAC - Cheat developer platform☆28Oct 29, 2021Updated 4 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆235Dec 21, 2021Updated 4 years ago
- ☆136Aug 6, 2022Updated 3 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆632Mar 19, 2019Updated 6 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆34Jul 19, 2021Updated 4 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- Library containing Anti-RE and Anti-Debug methods.☆121Apr 30, 2025Updated 10 months ago
- ☆84Apr 1, 2022Updated 3 years ago
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆19Feb 25, 2023Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- ☆82Mar 20, 2022Updated 3 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆630Dec 26, 2024Updated last year
- ☆50Apr 19, 2020Updated 5 years ago
- A collection of Anti-RE & Anti-Dump methods☆28Jan 5, 2021Updated 5 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆157Nov 14, 2021Updated 4 years ago
- BattlEye shellcodes tester☆151Jan 3, 2022Updated 4 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- Analyze patches in a process☆259Jul 28, 2021Updated 4 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago