jonomango / mango-library
π₯windows memory library aimed towards game hacking
β40Updated 4 years ago
Alternatives and similar repositories for mango-library:
Users that are interested in mango-library are comparing it to the libraries listed below
- β50Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.β69Updated 3 years ago
- driver manual mapperβ28Updated 5 years ago
- β70Updated 5 years ago
- β37Updated 7 years ago
- x64 manual mapper using inline syscallsβ8Updated 3 years ago
- β30Updated 2 years ago
- Communication via callbackβ73Updated 5 years ago
- Kernel Lazy Importerβ109Updated 10 months ago
- Discarded Section Manual Mapβ67Updated 4 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisyβ79Updated 4 years ago
- Hide external overlay by using SetWindowDisplayAffinityβ92Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.β109Updated 3 years ago
- Ironsight Internal Multihackβ38Updated last year
- A mini anti-anti debug hooking library for Windows.β106Updated 4 years ago
- A lightweight BattlEye emulator of the launcherβ60Updated 2 years ago
- A wrapper class to hide the original calling address of a functionβ57Updated 4 years ago
- PUBG Lite SDK External Generator, base on KN4CK3R's UnrealEngineSDKGenerator.β10Updated 5 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.β107Updated 3 years ago
- β33Updated 2 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EACβ46Updated 3 years ago
- Kernel driver that uses Shared memory to communicate with UserModeβ85Updated 5 years ago
- Using CVE-2021-40449 to manual map kernel mode driverβ100Updated 2 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheatβ69Updated 2 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.β78Updated 3 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.β64Updated last year
- manually map driver for a signed driver memory spaceβ147Updated 3 years ago
- Calling "own" MouseClassServiceCallbackβ64Updated 2 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sectionsβ54Updated 5 years ago
- β78Updated 3 years ago