samrussell / armswideopenLinks
Anti-anti-debug: reset ThreadHideFromDebugger
☆15Updated 3 years ago
Alternatives and similar repositories for armswideopen
Users that are interested in armswideopen are comparing it to the libraries listed below
Sorting:
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Updated 2 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 3 years ago
- Helps to find patched modules☆30Updated 4 years ago
- Load driver on boot before anti-cheats☆33Updated last year
- ☆46Updated 3 years ago
- This tool Decrypt and Extract the files from the EAC☆66Updated 2 years ago
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆68Updated last year
- A debugger library using VEH.☆62Updated 11 months ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- ☆37Updated 2 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- External Il2Cpp Framework☆60Updated 4 years ago
- ☆50Updated last year
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- ☆20Updated 3 years ago
- ☆42Updated 3 years ago
- ☆22Updated 3 years ago
- ☆25Updated last year
- page table manipulation to gain physical r/w☆44Updated last year
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆128Updated 4 years ago
- An AI-powered assistant for IDA 9.0+ to accelerate reverse engineering of C++ games.☆125Updated 2 weeks ago
- Known ring3 memory protections that can be handled at a simple level.☆66Updated 2 years ago
- Old way for blocking NMI interrupts☆27Updated 2 years ago
- ☆74Updated 2 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆79Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- ☆32Updated 3 years ago
- Top level overlay drawing for game cheating using dwm.exe☆46Updated 3 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆104Updated 2 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago