rifk01 / RTTI_OBFUSCATOR_NOBOOSTLinks
☆38Updated 8 years ago
Alternatives and similar repositories for RTTI_OBFUSCATOR_NOBOOST
Users that are interested in RTTI_OBFUSCATOR_NOBOOST are comparing it to the libraries listed below
Sorting:
- Communication via callback☆74Updated 6 years ago
- NT reversal☆26Updated 7 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- ☆31Updated 7 years ago
- Capcom wrapper with safety in mind.☆82Updated 7 years ago
- ☆51Updated 5 years ago
- ☆50Updated 6 years ago
- ☆34Updated 5 years ago
- Manual PE image mapper☆65Updated 12 years ago
- Disable Driver Callbacks☆104Updated 8 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- A small wrapper class providing an unified interface to search for various memory signatures☆78Updated 3 years ago
- ☆41Updated 6 years ago
- Helps to find patched modules☆30Updated 5 years ago
- Detect removed thread from PspCidTable.☆74Updated 3 years ago
- UAC - Cheat developer platform☆28Updated 4 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- Discarded Section Manual Map☆67Updated 5 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆25Updated 8 years ago
- a dumb rpm/wpm example driver☆15Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Updated 6 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆82Updated 4 years ago
- driver manual mapper☆27Updated 5 years ago
- battleye shellcode☆18Updated 5 years ago
- Mono process injector☆22Updated 6 years ago
- ☆18Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ☆48Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆12Updated 5 years ago