keowu / mhyprot2View external linksLinks
Reverse engineering Genshin Impact anticheat to study how anticheats work on the Windows operating system.
☆107Nov 27, 2021Updated 4 years ago
Alternatives and similar repositories for mhyprot2
Users that are interested in mhyprot2 are comparing it to the libraries listed below
Sorting:
- A user-mode emulator for the mhyprot2.sys driver☆118Aug 25, 2022Updated 3 years ago
- ☆38Dec 21, 2022Updated 3 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Control flow deobfuscation helper for Genshin Impact☆13Apr 12, 2022Updated 3 years ago
- A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.☆349Jul 3, 2021Updated 4 years ago
- Disable NMI Callbacks with Kernelmode Driver☆18Mar 15, 2023Updated 2 years ago
- A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests☆133Oct 26, 2020Updated 5 years ago
- Hoyoverse stop DMCAing random shit on github :((☆85Feb 19, 2023Updated 2 years ago
- Example driver on how to use SKLib☆67Nov 20, 2024Updated last year
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- Modified version of Il2CppAssemblyUnhollower that allows you to analysis GenShin Impact's UserAssembly.dll☆42Oct 28, 2020Updated 5 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- An Anti-Cheat Bypass for Genshin Impact that allows you to inject any dlls into the protected game.☆286Oct 3, 2020Updated 5 years ago
- Use GDI in KernelMode☆26Oct 1, 2022Updated 3 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Jan 2, 2020Updated 6 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆27Oct 16, 2017Updated 8 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Dec 11, 2021Updated 4 years ago
- Free Genshin Impact cheat.☆11Jan 21, 2023Updated 3 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Sep 12, 2024Updated last year
- 🧪 Hypervisor with EPT hooking support.☆308Jan 1, 2026Updated last month
- vmp .net devirtualizer☆61Updated this week
- ☆49Feb 21, 2022Updated 3 years ago
- Anti-anti-debug: reset ThreadHideFromDebugger☆15Nov 25, 2021Updated 4 years ago
- ☆37May 21, 2022Updated 3 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- ☆70Aug 31, 2021Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆204Dec 16, 2022Updated 3 years ago
- ☆23May 17, 2022Updated 3 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Apr 7, 2021Updated 4 years ago
- Code for Battleyes shellcode☆239Nov 11, 2021Updated 4 years ago
- Only for Stress-Testing☆26Apr 9, 2022Updated 3 years ago
- ☆27Oct 18, 2023Updated 2 years ago
- External "Genshin Impact" Cheat☆35Oct 21, 2020Updated 5 years ago
- 🥭windows memory library aimed towards game hacking☆42May 28, 2020Updated 5 years ago