rifk01 / RTTI_OBFUSCATOR_NOBOOSTLinks
☆38Updated 8 years ago
Alternatives and similar repositories for RTTI_OBFUSCATOR_NOBOOST
Users that are interested in RTTI_OBFUSCATOR_NOBOOST are comparing it to the libraries listed below
Sorting:
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Communication via callback☆73Updated 6 years ago
- Capcom wrapper with safety in mind.☆83Updated 7 years ago
- Manual PE image mapper☆66Updated 12 years ago
- ☆31Updated 7 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆62Updated 5 years ago
- BattlEye x64 usermode injector☆66Updated 6 years ago
- NT reversal☆25Updated 7 years ago
- Disable Driver Callbacks☆104Updated 8 years ago
- ☆41Updated 6 years ago
- ☆50Updated 6 years ago
- ☆50Updated 5 years ago
- A small wrapper class providing an unified interface to search for various memory signatures☆79Updated 4 years ago
- C/C++ example of InjectMouseInput function☆35Updated 4 years ago
- My take on the capcom driver vulnerability☆28Updated 8 years ago
- a dumb rpm/wpm example driver☆15Updated 4 years ago
- Memory integrity check with CRC32 instruction, section-based☆49Updated 8 months ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆33Updated 6 years ago
- ☆35Updated 5 years ago
- Using DKOM to hide kernel mode drivers☆56Updated 8 years ago
- A User Mode (UM) Framework which can be used to make anything. From cheats, to anti cheats or even a normal program. The framework will s…☆28Updated 5 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆25Updated 8 years ago
- Mapping your code on a 0x1000 size page☆71Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆76Updated 4 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 5 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- battleye shellcode☆18Updated 6 years ago
- Just my first IOCTL try☆75Updated 5 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆111Updated 5 years ago
- ☆47Updated 5 years ago