nickcano / game-hackingLinks
Tutorials, tools, and more as related to reverse engineering video games.
☆29Updated 7 years ago
Alternatives and similar repositories for game-hacking
Users that are interested in game-hacking are comparing it to the libraries listed below
Sorting:
- x64 usermode rootkit☆209Updated 7 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆147Updated 7 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆70Updated 5 years ago
- A simple Dll Injection demonstration☆120Updated 8 years ago
- Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..☆185Updated 11 years ago
- A simple project to demonstrate function hooking / detouring☆127Updated 8 years ago
- Handle access elevation via direct kernel object manipulation☆118Updated 7 years ago
- PE permutation library☆277Updated 2 years ago
- RootKit & Cheat Scanner - Windows☆223Updated 6 years ago
- Disable Driver Callbacks☆104Updated 8 years ago
- Simple benchmark for findpattern implementations.☆162Updated 10 months ago
- A Simple dynamic library to demonstrate IAT API hooking on Windows NT.☆87Updated 8 years ago
- Detect manualmapped images remotely, without hassle☆152Updated 8 years ago
- This is a simple mutation engine. It does not have many features and you have to add actual mutation, when you want to use it - It does m…☆36Updated 8 years ago
- Open-source user-mode Anti-Anti-Debug plugin for x64dbg & cheatengine.☆213Updated 8 years ago
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆32Updated 11 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- x86/x64 manual mapping injector using the JUCE library☆87Updated 5 years ago
- (Ab)using the XIGNCODE3 driver to open a handle to any process.☆62Updated 7 years ago
- Basic example of how to change the initial rights on a memory region during runtime.☆43Updated 2 years ago
- A tool for reconstructing data types based on memory - [Outdated; use ReClassEx]☆125Updated 11 years ago
- Windows kernel samples☆258Updated 6 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆224Updated 7 years ago
- ☆18Updated 10 years ago
- driver mapper / capcom wrapper☆225Updated 6 years ago
- A port of DrunkenCheetah's Project to x64☆76Updated 11 years ago
- Mono Framework Interaction / Injection Library for .NET (C++/CLI)☆72Updated 7 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆108Updated 5 years ago
- Stealth DLL injector☆90Updated last year