joaovarelas / h00k-game-hack
C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.
☆14Updated 10 years ago
Alternatives and similar repositories for h00k-game-hack:
Users that are interested in h00k-game-hack are comparing it to the libraries listed below
- Makes drivers less sucky to manage from usermode.☆11Updated 8 years ago
- A User Mode (UM) Framework which can be used to make anything. From cheats, to anti cheats or even a normal program. The framework will s…☆28Updated 4 years ago
- Open source Anti Debug methods to use for your games. This uses SAC as an example. Will be sure to update it and / or add new features in…☆18Updated 4 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Updated 10 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆19Updated 6 years ago
- My take on the capcom driver vulnerability☆26Updated 7 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- PE rebuilder, based on yoda's realigndll☆11Updated 13 years ago
- New handle stealing technique for windows apps☆12Updated 7 years ago
- easy to use vtable hook with RTTI support☆23Updated 5 years ago
- A Windows driver used to facilitate DLL injection☆24Updated 7 years ago
- Wrapper for VMProtect Library (only MSVC)☆36Updated 6 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆13Updated 7 years ago
- p2c loader(this is also the loader isolation.top used)☆14Updated 7 years ago
- MIR-Engine☆21Updated 7 years ago
- ☆17Updated 4 years ago
- ☆25Updated 7 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago