☆36Mar 19, 2019Updated 6 years ago
Alternatives and similar repositories for ca
Users that are interested in ca are comparing it to the libraries listed below
Sorting:
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- UAC - Cheat developer platform☆28Oct 29, 2021Updated 4 years ago
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆33Nov 3, 2019Updated 6 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- ☆11May 1, 2022Updated 3 years ago
- 模仿PCHUNTER的ARK工具☆38Jan 9, 2020Updated 6 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago
- ☆15Mar 28, 2015Updated 10 years ago
- X32DBG QT5 parsing scripts☆11Sep 8, 2022Updated 3 years ago
- A simple kernel-level plugin for ReClass.NET☆37May 15, 2018Updated 7 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- ☆24Mar 30, 2021Updated 4 years ago
- ☆23Sep 17, 2019Updated 6 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Dec 9, 2021Updated 4 years ago
- ☆56Nov 21, 2022Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆55Aug 9, 2020Updated 5 years ago
- intel vt-x hypervisor ept☆25May 19, 2020Updated 5 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆55Jul 24, 2021Updated 4 years ago
- VEH debug plugin☆13Apr 28, 2022Updated 3 years ago
- 一个界面基于IMGUI的ARK,目前R3实现☆13Nov 1, 2023Updated 2 years ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- ayy debuger☆89Mar 3, 2024Updated last year
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆37Oct 26, 2020Updated 5 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- ShotHv☆154Mar 8, 2022Updated 3 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- ☆185May 5, 2019Updated 6 years ago