jnastarot / anti-cheatLinks
anti-cheat based on user-mode tricks and undocumented methods
☆23Updated 7 years ago
Alternatives and similar repositories for anti-cheat
Users that are interested in anti-cheat are comparing it to the libraries listed below
Sorting:
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆22Updated 5 months ago
- New handle stealing technique for windows apps☆13Updated 7 years ago
- Memory Guard Library☆11Updated 4 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆14Updated 7 years ago
- NT reversal☆25Updated 7 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Updated 10 years ago
- Mouse emulation driver for Windows 10 x64☆31Updated 7 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- easy to use vtable hook with RTTI support☆23Updated 5 years ago
- ☆38Updated 8 years ago
- A tool to dump informations about the caller of a function.☆13Updated 8 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ☆17Updated 4 years ago
- ☆31Updated 6 years ago
- External cheat base with DirectX overlay☆20Updated 6 years ago
- by others☆38Updated 7 years ago
- bypass CRC☆11Updated 7 years ago
- My take on the capcom driver vulnerability☆28Updated 7 years ago
- x64 assembler library☆31Updated last year
- ☆36Updated 5 years ago
- A User Mode (UM) Framework which can be used to make anything. From cheats, to anti cheats or even a normal program. The framework will s…☆29Updated 4 years ago
- Some garbage drivers written for getting started☆65Updated 5 years ago
- ☆27Updated 7 years ago
- ☆48Updated 6 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- ☆18Updated 4 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆14Updated 6 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago