kotae4 / intro-to-gamehackingLinks
A compendium of things related to reverse engineering videogames
☆51Updated 3 years ago
Alternatives and similar repositories for intro-to-gamehacking
Users that are interested in intro-to-gamehacking are comparing it to the libraries listed below
Sorting:
- Various IDA scripts I've created for Reverse engineering.☆87Updated 10 months ago
- An AI-powered assistant for IDA 9.0+ to accelerate reverse engineering of C++ games.☆166Updated 3 weeks ago
- ☆52Updated 3 years ago
- ☆42Updated 3 years ago
- Hooking ULocalPlayer::GetViewPoint for the purpose of a freecam or fov changer.☆49Updated 3 years ago
- Iterate FUObjectArray->ObjObjects & FNamePool->Entries☆40Updated 3 years ago
- Unpacking VMProtected Executable Guide☆120Updated 5 years ago
- Extracts eac's driver at runtime without it touching the disk.☆35Updated 5 months ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆93Updated 5 years ago
- A plugin for x64dbg that can copy RVA from unknown memory pages☆34Updated 3 years ago
- VMProtect, VMP, Devirter, 3,5☆108Updated 2 years ago
- This tool Decrypt and Extract the files from the EAC☆69Updated last month
- Hardware ID☆54Updated 3 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- game dumper☆47Updated 5 years ago
- kernel-mode cs:go cheat without the need of a user-mode controller.☆20Updated 2 years ago
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆76Updated last year
- ☆46Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆55Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆60Updated 3 years ago
- ☆82Updated 4 years ago
- Game cheat base and clean architecture for your next cheat☆105Updated last year
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆80Updated last year
- Intercept ProcessEvent calls on any game object (Unreal Engine 4)☆48Updated 3 years ago
- VM devirtualization PoC based on AsmJit and llvm☆117Updated 4 years ago
- A devirtualization engine for Themida.☆100Updated last year
- ☆58Updated 2 years ago