☆36Mar 19, 2019Updated 7 years ago
Alternatives and similar repositories for ca
Users that are interested in ca are comparing it to the libraries listed below
Sorting:
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- UAC - Cheat developer platform☆28Oct 29, 2021Updated 4 years ago
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- ☆11May 1, 2022Updated 3 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Proof of Concept Kernel-User Communication using System Thread.☆14Sep 24, 2023Updated 2 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆33Nov 3, 2019Updated 6 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- ☆15Mar 28, 2015Updated 10 years ago
- A intel hypervisor, implementing many virtualization techniques☆52Apr 24, 2023Updated 2 years ago
- Simple dll injector that uses thread hijacking to execute the payload☆12Jul 7, 2022Updated 3 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆56Jul 24, 2021Updated 4 years ago
- 一个界面基于IMGUI的ARK,目前R3实现☆13Nov 1, 2023Updated 2 years ago
- ☆23Sep 17, 2019Updated 6 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- 模仿PCHUNTER的ARK工具☆38Jan 9, 2020Updated 6 years ago
- 不使用3环挂钩进行DWM桌面绘制☆83Dec 9, 2021Updated 4 years ago
- A wrapper class to hide the original calling address of a function☆54Aug 9, 2020Updated 5 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 3 years ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Feb 22, 2023Updated 3 years ago
- ☆24Mar 30, 2021Updated 4 years ago
- ☆56Nov 21, 2022Updated 3 years ago
- A simple kernel-level plugin for ReClass.NET☆37May 15, 2018Updated 7 years ago
- ShotHv☆155Mar 8, 2022Updated 4 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- base for testing☆187Sep 28, 2024Updated last year
- The trashvisor☆12Oct 25, 2020Updated 5 years ago