pr701 / vcproxy
DLL hijacking with vcruntime140
☆27Updated 3 years ago
Alternatives and similar repositories for vcproxy:
Users that are interested in vcproxy are comparing it to the libraries listed below
- ☆30Updated 3 years ago
- Experimental imgui app framework for rapid prototyping.☆14Updated last year
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆31Updated 3 years ago
- Pointer search for any classes using the RTTI feature.☆50Updated 4 years ago
- ☆49Updated 6 years ago
- Use the Cheat Engine driver in your own process!☆22Updated 6 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- A simple library which provides a way to read and write the memory of other processes☆51Updated 6 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- A set of tools for working with software modifications in two files (Detours.h, Detours.cpp).☆38Updated 2 weeks ago
- Small memory leak PoC that is happening in IopGetDeviceInterfaces☆25Updated 4 years ago
- Reverse Engineering☆13Updated 7 years ago
- Native API header files for the Process Hacker project (nightly).☆26Updated this week
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- Debug Print viewer (user and kernel)☆66Updated last year
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- Custom LoadLibrary implementation☆58Updated 9 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆41Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆35Updated 4 years ago
- Finds all first occurring string references near another reference☆18Updated 3 years ago
- C++ console logging library (fmt wrapper)☆17Updated 5 years ago
- a C++ library which will automatically download a module's PDB file, then parse it for a function address☆20Updated 7 years ago
- A bunch of architectural headers for i386 and AMD64☆36Updated last year
- Create and find signatures in Binary Ninja☆27Updated last year
- A slightly safer io access library☆13Updated 3 years ago
- This tool Decrypt and Extract the files from the EAC☆64Updated last year
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- Bypassing EAC integrity checks by abusing a TOCTOU in Dead by Daylight.☆20Updated 4 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago