realnexlevel / EQU8-Usermode-Bypass
☆10Updated 3 years ago
Alternatives and similar repositories for EQU8-Usermode-Bypass:
Users that are interested in EQU8-Usermode-Bypass are comparing it to the libraries listed below
- ☆26Updated 3 years ago
- A Kernel driver for using against anti cheats like EAC or BE☆13Updated 3 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- process dumper targeting CS:GO internal cheats☆23Updated 3 years ago
- An Internal Cheat For Unreal Engine Based Game "Splitgate"☆35Updated 3 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆25Updated 3 years ago
- ☆16Updated 4 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆22Updated 3 years ago
- Helps to find patched modules☆27Updated 4 years ago
- ☆14Updated 2 years ago
- ☆19Updated 4 years ago
- Ironsight Internal Multihack☆38Updated last year
- Basicly Guys This Is A 2 Months Old Driverless Fully Undetected Eac And Be Spoofer Source By Hopesar#1338 It Uses Amidewin Etc To Spoof R…☆12Updated 2 years ago
- UD overlay using SetWindowsHookEx☆15Updated 2 years ago
- Hooking library using Valve's GameOverlayRenderer☆13Updated 2 years ago
- Different examples of process hollowing.☆13Updated 4 years ago
- Single header code that sets any section's page to No Access☆11Updated 2 years ago
- Kernel Injector pasted from various different Github repositories.☆20Updated 5 years ago
- ☆50Updated 4 years ago
- ☆14Updated 2 years ago
- internal splitgate cheat. esp only, good base☆9Updated 3 years ago
- i made it because i want it dont worry☆16Updated 2 years ago
- Inserts your process into EQU8's Trusted process list allowing for the process to open a handle. EQU8 is used by Totally Accurate Battleg…☆15Updated 3 years ago
- C/C++ example of InjectMouseInput function☆31Updated 3 years ago
- ☆15Updated 3 years ago
- Simple tool deobfuscating a Modern Warfare dump so IDA can analyse it right way (and faster).☆18Updated 3 years ago
- ☆32Updated 7 years ago
- Used in tandem with a spoofer of your choosing, this will "clean" the trace files that MW uses after an HWID ban or shadowban☆12Updated last year
- ☆18Updated 4 years ago
- Manual map injection complete with a secure login system.☆9Updated 4 years ago