kotae4 / intro-to-gamehacking
A compendium of things related to reverse engineering videogames
☆48Updated 2 years ago
Alternatives and similar repositories for intro-to-gamehacking:
Users that are interested in intro-to-gamehacking are comparing it to the libraries listed below
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆92Updated 6 months ago
- Various IDA scripts I've created for Reverse engineering.☆83Updated 5 months ago
- This tool Decrypt and Extract the files from the EAC☆64Updated last year
- ☆42Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆61Updated 2 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆69Updated 2 years ago
- External Il2Cpp Framework☆60Updated 3 years ago
- Attempts to decrypt JM Xorstr in some x64 binaries☆52Updated 2 years ago
- ☆58Updated last year
- BottlEye is a usermode emulator for the popular anti-cheat BattlEye☆42Updated 4 years ago
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆58Updated 11 months ago
- game dumper☆44Updated 4 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆81Updated 2 years ago
- ☆73Updated 11 months ago
- A simple UM + KM example of how to bypass EAC CR3☆114Updated 2 months ago
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆98Updated 7 months ago
- ☆78Updated 3 years ago
- C++ Framework for external cheats☆69Updated 7 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆57Updated last year
- A devirtualization engine for Themida.☆97Updated last year
- Intercept ProcessEvent calls on any game object (Unreal Engine 4)☆47Updated 2 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 2 years ago
- Iterate FUObjectArray->ObjObjects & FNamePool->Entries☆38Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated last year
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Extracts eac's driver at runtime without it touching the disk.☆33Updated last year
- kernel-mode cs:go cheat without the need of a user-mode controller.☆20Updated 2 years ago
- csgo external running from kernelmode☆103Updated 2 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆90Updated 5 years ago
- Unpacking VMProtected Executable Guide☆116Updated 4 years ago