learn-more / findpattern-bench
Simple benchmark for findpattern implementations.
☆161Updated last month
Alternatives and similar repositories for findpattern-bench:
Users that are interested in findpattern-bench are comparing it to the libraries listed below
- C++17 PE manualmapper☆329Updated 3 years ago
- BattlEye compatible injector, done completely from user-mode, project by secret.club☆244Updated 4 years ago
- Windows kernel samples☆247Updated 5 years ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆193Updated 7 years ago
- driver mapper / capcom wrapper☆219Updated 5 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆141Updated 6 years ago
- Hook WinAPI functions used by Valve Anti-Cheat. Log calls and intercept arguments & return values. DLL written in C.☆168Updated 4 years ago
- Module extending manual mapper☆324Updated 4 years ago
- D3D11 Worldtoscreen Finder, dx11 w2s, d3d11 w2s, esp, world to screen☆339Updated 3 months ago
- VAC2 Emulator & VAC3 Response Parser☆82Updated 7 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆183Updated 4 years ago
- Kernel mode bypass for BattlEye, EAC☆186Updated last year
- A customizable process dumper.☆138Updated 5 years ago
- ☆82Updated 3 years ago
- x64dbg plugin which removes anti-dumping and obfuscation techniques from the popular FPS game Overwatch.☆242Updated 3 years ago
- Rendering on external windows via hijacking thread contexts☆381Updated 4 years ago
- Windows driver for spoofing serial number of HDDs☆208Updated 2 years ago
- A simple program to demonstrate external signature scanning.☆69Updated 2 years ago
- A Simple demonstration of manual dll injector☆201Updated 3 years ago
- External mid-function hooking method to retrieve register data☆86Updated 6 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆274Updated 8 years ago
- driver manual mapper (outdated/for educational purposes)☆99Updated 5 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆345Updated 4 years ago
- EAC Bypass☆303Updated 4 years ago
- Reversing EasyAntiCheat.☆540Updated 5 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆282Updated 4 years ago
- Detect manualmapped images remotely, without hassle☆153Updated 7 years ago
- Hooking kernel functions by abusing alignment☆240Updated 4 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 5 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆220Updated 7 years ago