lolp1 / GetD3DHookOffsetLinks
A simple tool to extract the DX11/9 devices hook address.
☆34Updated 7 years ago
Alternatives and similar repositories for GetD3DHookOffset
Users that are interested in GetD3DHookOffset are comparing it to the libraries listed below
Sorting:
- Lightweight and flexible library to load and communicate with kernel drivers on Windows.☆73Updated 3 months ago
- Transparent aero overlay for Windows using Direct2D + DirectWrite ⚡️ Support for custom rendering 🚀☆90Updated 5 years ago
- Mono Framework Interaction / Injection Library for .NET (C++/CLI)☆70Updated 7 years ago
- A simple open source memory hooking library for Windows x86/x64☆87Updated 4 years ago
- Object Oriented Overlay For Game Hacking☆45Updated 11 years ago
- DLL injector that bypasses some checks for valid certificates.☆37Updated 7 years ago
- An x64dbg plugin that allows users to execute Cheat Engine auto assembler scripts within x64dbg.☆75Updated 7 years ago
- paladins d3d multihack☆33Updated last year
- I wanted a nicer signature scanner that worked the way I wanted. Include however you want in your own DLL project.☆47Updated 10 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- D3D/DirectX Model recognition values for multiple games, used to create wallhack or chams☆24Updated 8 years ago
- BattlEye BEClient<->BEService usermode emulator☆83Updated 5 years ago
- Mono/Unity assembly injection☆63Updated 5 years ago
- API to work with Win32 process memory and hardware breakpoints☆25Updated 5 years ago
- A Cheat I Made Using C# In My Free Time Trying To Improve Myself. Enjoy!☆11Updated 4 years ago
- Full H1Z1 internal, done with detour and D3D11 hooks☆20Updated 7 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆76Updated 6 years ago
- Hiding x32/x64 Modules/DLLs using PEB☆61Updated 10 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆44Updated 4 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- A tool created to scan for values in a program's memory and edit them, much like Cheat Engine.☆42Updated 3 years ago
- Library for managing third -party process memory☆23Updated last year
- APEX-EACBypass(usermode)☆47Updated 6 years ago
- Example to execute code in a remote process using wndproc trick☆16Updated 8 years ago
- Bypass User Account Control by manipulating tokens☆34Updated 7 years ago
- A Windows game hacking framework☆41Updated 8 years ago
- Detours lib that I use☆85Updated 3 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆118Updated 8 years ago
- An open-source x86 / x86-64 hooking library for Windows.☆95Updated 11 months ago
- Use the Cheat Engine driver in your own process!☆24Updated 7 years ago