rmccrystal / offset-dumperLinks
A tool that dumps offsets from a game's memory buffer
☆13Updated 4 years ago
Alternatives and similar repositories for offset-dumper
Users that are interested in offset-dumper are comparing it to the libraries listed below
Sorting:
- ☆21Updated 2 years ago
- Extract sequences of instructions to be executed exclusively on a remote server☆37Updated 2 months ago
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆24Updated 8 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆53Updated last year
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- Windows driver mapper via the UEFI☆51Updated 5 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- A lightweight BattlEye emulator of the launcher☆60Updated 3 years ago
- x86-64 virtualizing obfuscator written in Rust☆77Updated 2 years ago
- ☆45Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆35Updated last year
- ☆84Updated last year
- ☆89Updated 2 months ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- C/C++ antidebugging library for Windows☆47Updated last month
- ☆62Updated 2 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- Collection of Cheat dumps for Research and Detection.☆16Updated 5 months ago
- Retrieves VAC module ice encryption key by reversing the LCG seed that it was generated with☆15Updated 3 months ago
- Kernel Level NMI Callback Blocker☆148Updated 3 months ago
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆37Updated last year
- Kernel anti-cheat for protecting software.☆105Updated 2 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated 2 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆34Updated 2 years ago
- ☆44Updated 10 months ago
- ☆28Updated 2 years ago
- a parser for the .map file included in the aimware leak☆16Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 7 months ago
- Just check hypervisor in ring0☆16Updated 2 years ago