lguilhermee / Battleye-Shellcode-DumperLinks
BEClient2.dll Dumper
☆21Updated 4 years ago
Alternatives and similar repositories for Battleye-Shellcode-Dumper
Users that are interested in Battleye-Shellcode-Dumper are comparing it to the libraries listed below
Sorting:
- ☆19Updated 4 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆46Updated 4 years ago
- ☆49Updated 5 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆51Updated last year
- ☆22Updated 3 years ago
- ☆42Updated 3 years ago
- Just my first IOCTL try☆74Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- ☆54Updated 2 years ago
- ☆53Updated 2 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- ☆46Updated 3 years ago
- Helps to find patched modules☆29Updated 4 years ago
- ☆63Updated 2 years ago
- ☆47Updated 4 years ago
- ☆31Updated 3 years ago
- ☆69Updated 3 years ago
- ☆21Updated 3 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆23Updated 2 years ago
- ☆36Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- ☆50Updated last year
- (also old project) Contains working manual mapping from a remote server (without exceptions), hybrid encryption (needs to be corrected), …☆19Updated 4 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- ☆17Updated 4 years ago
- ☆25Updated last year