lhaasper / DozeLinks
If you made it in here I have no clue how, well hi
☆12Updated 3 years ago
Alternatives and similar repositories for Doze
Users that are interested in Doze are comparing it to the libraries listed below
Sorting:
- ☆47Updated 4 years ago
- Helps to find patched modules☆30Updated 4 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆24Updated 4 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- ☆46Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Updated 3 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Updated 4 years ago
- Simulate SendInput with ClassService☆33Updated 6 years ago
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- page table manipulation to gain physical r/w☆44Updated last year
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆24Updated 2 years ago
- ☆25Updated last year
- C/C++ example of InjectMouseInput function☆33Updated 4 years ago
- POC kernel driver with hidden system thread☆14Updated last year
- ☆42Updated 3 years ago
- Stealing signatures from pe files☆17Updated 4 months ago
- ☆36Updated 5 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆18Updated 3 years ago
- internal splitgate cheat. esp only, good base☆9Updated 3 years ago
- ☆18Updated 4 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- ☆32Updated 3 years ago
- ☆18Updated 4 years ago
- ☆41Updated 2 years ago
- ☆80Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago