m4drat / cheat_examplesLinks
two types (external/internal) cheat examples, and game to test on.
☆13Updated 2 years ago
Alternatives and similar repositories for cheat_examples
Users that are interested in cheat_examples are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆26Updated 5 years ago
- Simple driver loader for windows☆17Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆17Updated last year
- Small class to help perform syscalls.☆21Updated last month
- ⚙️ Map and execute EXE in memory☆10Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 4 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- ☆11Updated 5 years ago
- stop any process from looking into your process by hooking.☆19Updated last year
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 5 years ago
- Мутация PE x86☆15Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 6 years ago
- I did a full in depth video explaining this here: https://www.youtube.com/watch?v=u2jFhdrHVg0&t=294s☆10Updated 4 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆15Updated 5 years ago
- ☆18Updated 3 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Updated 2 years ago
- Program to leak anti-virus behaviour and such☆15Updated 6 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 4 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 3 years ago
- what the fuck is this shit☆24Updated 9 years ago
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- a simple obfuscator☆1Updated last year
- Fake Timestamps of Driver Certificates while keeping validity.☆18Updated 3 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- Disable threat tracing from the kernel..☆13Updated 3 years ago