manucorporat / OBMELinks
OBME: OBfuscated MEmory. Fast and easy to use tool in simple C++ to avoid memory cheating by scanning (searching). See igameguardian, "Cheat Engine"...
☆33Updated 8 years ago
Alternatives and similar repositories for OBME
Users that are interested in OBME are comparing it to the libraries listed below
Sorting:
- Spoof Windows Test Signing Mode☆29Updated 7 years ago
- MIR-Engine☆24Updated 8 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Updated 11 years ago
- ☆27Updated 8 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆21Updated 9 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆24Updated 11 months ago
- A trainer engine template used in gamehacking and cheating.☆14Updated 11 years ago
- Replaced by https://github.com/Nukem9/SwissArmyKnife. A plugin for simple code signature generation in x64dbg☆44Updated 5 years ago
- XEDParse emulator based on asmjit/asmtk.☆21Updated last year
- hook sysenter,重载内核,下硬件断点到debugport,防止debugport清零☆25Updated 11 years ago
- Mouse emulation driver for Windows 10 x64☆30Updated 8 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆25Updated 8 years ago
- ☆14Updated 9 years ago
- Complete environement for network injected reversing☆21Updated 9 years ago
- Wow64 syscall hook☆42Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27Updated 11 years ago
- Use the Cheat Engine driver in your own process!☆25Updated 7 years ago
- New handle stealing technique for windows apps☆14Updated 8 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Updated 11 years ago
- A Windows driver used to facilitate DLL injection☆27Updated 8 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago
- The demo on Windows☆21Updated 9 years ago
- 仿WPE拦截Socket☆17Updated 12 years ago
- ☆15Updated last year
- Tool to automatically make Cheat Engine attach to a process via the command line.☆29Updated 8 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆15Updated 6 years ago
- ☆17Updated 9 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Updated 8 years ago
- PE rebuilder, based on yoda's realigndll☆12Updated 14 years ago
- ☆27Updated 8 years ago