nevioo1337 / VAC-ModuleDumper
Dumps VAC(Valve Anti-Cheat) modules that get streamed and mapped while playing a VAC protected game
☆0Updated last year
Alternatives and similar repositories for VAC-ModuleDumper:
Users that are interested in VAC-ModuleDumper are comparing it to the libraries listed below
- Test data for x86 instructions☆13Updated 3 years ago
- C++ BattlEye anticheat-emulator☆28Updated 2 years ago
- RWX Section Abusing☆17Updated last year
- Not mine, just saved☆13Updated last year
- Disable NMI Callbacks with Kernelmode Driver☆18Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆17Updated 2 years ago
- Using SetWindowHookEx for preinjected DLL's☆58Updated 2 years ago
- ☆38Updated last year
- A Windows API hooking library !☆31Updated 2 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- ☆30Updated 3 years ago
- Bypassing kernel patch protection runtime☆19Updated 2 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆11Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- ☆18Updated 2 years ago
- x64 assembler library☆31Updated 9 months ago
- Elevate arbitrary MSR writes to kernel execution.☆32Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 6 months ago
- ☆27Updated last year
- ☆41Updated last year
- C/C++ antidebugging library for Windows☆17Updated 2 months ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 6 months ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆41Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- ☆13Updated 4 years ago