m4drat / cheat_examplesLinks
two types (external/internal) cheat examples, and game to test on.
☆13Updated 2 years ago
Alternatives and similar repositories for cheat_examples
Users that are interested in cheat_examples are comparing it to the libraries listed below
Sorting:
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Small class to help perform syscalls.☆22Updated 3 weeks ago
- Скрытие Win API☆26Updated 5 years ago
- Simple driver loader for windows☆17Updated 5 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 4 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- a simple obfuscator☆1Updated last year
- ☆17Updated 3 years ago
- C++ Program used to dump Themida and VMProtect.☆25Updated last year
- Small driver that uses alternative syscalls feature (the project is still under development).☆15Updated last year
- Code Injection technique written in cpp language☆31Updated 7 years ago
- working injector bp (BE EAC & VANGUARD)☆4Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Updated 4 years ago
- Inject dll to explorer.exe and hide file from process.☆21Updated 4 years ago
- ☆32Updated last year
- VTable dumper for IDA 7.7+☆18Updated last year
- anti breakpoint using job objects in a simple way.☆12Updated last year
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆13Updated 4 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 5 years ago
- New handle stealing technique for windows apps☆13Updated 7 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆27Updated 3 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- Мутация PE x86☆15Updated 6 years ago
- Process hiding library☆19Updated 5 years ago
- A platform independent C++ code obfuscator.☆13Updated 5 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- Dll injector POC for new handle stealing technique☆20Updated 7 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- Microsoft Redistributable Download & Installer☆17Updated 5 years ago