maluramichael / dll-proxy-generatorLinks
Creates a proxy dll which sits between the game and original dll
☆149Updated 11 months ago
Alternatives and similar repositories for dll-proxy-generator
Users that are interested in dll-proxy-generator are comparing it to the libraries listed below
Sorting:
- The most powerful and customizable binary pattern scanner☆247Updated 4 years ago
- Vectored Exception Handling Hooking Class☆167Updated 7 years ago
- Anti-cheat library for Windows C++☆496Updated 3 years ago
- Collection of undocumented Windows API declarations.☆341Updated 2 weeks ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆243Updated 6 years ago
- Single-header, minimalistic, cross-platform hook library written in pure C☆374Updated last month
- A bunch of parsers for PE and PDB formats in C++☆265Updated last year
- Handle elevation DKOM against ObRegisterCallbacks☆326Updated 7 years ago
- A simple constexpr string literal obfuscator.☆126Updated 8 years ago
- Hide function calls to prevent reverse-engineering☆74Updated 4 years ago
- Rendering on external windows via hijacking thread contexts☆404Updated 5 years ago
- Universal graphical hook for Windows apps.☆255Updated last year
- A simple project to demonstrate function hooking / detouring☆127Updated 8 years ago
- C++ 20 Control Flow Obfuscation library for Windows Binaries☆430Updated 4 months ago
- Some DLL Injection techniques in C++ implemented for both x86 and x64 windows OS processes☆340Updated 4 years ago
- Memory-Hacking Software (MHS) X, the new from-scratch MHS, the next most-popular RAM-searching/debugging/game-hacking tool after Cheat En…☆106Updated last week
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆297Updated 2 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆342Updated 5 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆105Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆384Updated 3 years ago
- C++17 PE manualmapper☆430Updated 4 years ago
- SDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix …☆136Updated 2 years ago
- A simple tool for merging DLLs into executables with PEB-invisible mapping.☆290Updated last year
- COFF and Portable Executable format described using standard C++ with no dependencies.☆338Updated 9 months ago
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆135Updated 4 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Updated 2 years ago
- Kernel mode driver for reading/writing process memory. C/Win32.☆305Updated 7 years ago
- set of single-header libraries for C/C++. The code is far from finished but some parts are quite usable.☆168Updated 4 years ago
- Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.☆473Updated 6 years ago
- Fumo Loader - All in one kernel-based DLL injector☆364Updated last year