memflow / memflow-win32Links
☆25Updated 4 months ago
Alternatives and similar repositories for memflow-win32
Users that are interested in memflow-win32 are comparing it to the libraries listed below
Sorting:
- memflow plugin for ReClass.NET☆23Updated last year
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆82Updated 4 years ago
- Hypervisor-based debugger for AMD processors☆59Updated last year
- ☆38Updated 2 years ago
- Windows driver mapper via the UEFI☆48Updated 3 months ago
- Linux kernel module for memflow's KVM connector☆45Updated 9 months ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆83Updated 10 months ago
- A debugger library using VEH.☆64Updated last year
- Decrypts multiple BattlEye packets from BEService<>BEDaisy (including those with multiple encryption layers) out to a console.☆26Updated 3 years ago
- Modern C++ Networking Library☆35Updated 4 years ago
- DMA PE (Portable Executable) Dumper with DTB patching capabilities.☆46Updated 6 months ago
- A lightweight BattlEye emulator of the launcher☆60Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆126Updated 3 years ago
- Disks for DMA☆118Updated 4 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆29Updated 2 years ago
- This tool Decrypt and Extract the files from the EAC☆69Updated 2 months ago
- Top level overlay drawing for game cheating using dwm.exe☆45Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆89Updated 6 years ago
- driver that communicates using a shared section☆74Updated 7 months ago
- A intel hypervisor, implementing many virtualization techniques☆51Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆77Updated last year
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆98Updated 3 years ago
- ☆47Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆81Updated 3 years ago
- Expanding Kernel Lazy Importer☆32Updated 2 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 5 years ago
- Discarded Section Manual Map☆68Updated 5 years ago
- Ironsight Internal Multihack☆41Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago