rifk01 / RTTI_OBFUSCATOR_NOBOOSTLinks
☆38Updated 8 years ago
Alternatives and similar repositories for RTTI_OBFUSCATOR_NOBOOST
Users that are interested in RTTI_OBFUSCATOR_NOBOOST are comparing it to the libraries listed below
Sorting:
- Communication via callback☆72Updated 5 years ago
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- ☆50Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Capcom wrapper with safety in mind.☆82Updated 7 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- NT reversal☆25Updated 7 years ago
- Manual PE image mapper☆65Updated 11 years ago
- ☆36Updated 5 years ago
- ☆31Updated 6 years ago
- ☆50Updated 6 years ago
- ☆47Updated 4 years ago
- Memory integrity check with CRC32 instruction, section-based☆45Updated 2 months ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- Helps to find patched modules☆30Updated 4 years ago
- 🥭windows memory library aimed towards game hacking☆40Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Disable Driver Callbacks☆104Updated 7 years ago
- ☆100Updated last year
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- Discarded Section Manual Map☆70Updated 5 years ago
- Mono process injector☆22Updated 6 years ago
- ☆17Updated 4 years ago
- a dumb rpm/wpm example driver☆15Updated 4 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- A mini anti-anti debug hooking library for Windows.☆105Updated 4 years ago
- Memory Guard Library☆11Updated 4 years ago
- driver manual mapper☆28Updated 5 years ago
- Detect if a mouse event injected☆39Updated 8 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆67Updated 6 years ago