samrussell / armswideopenLinks
Anti-anti-debug: reset ThreadHideFromDebugger
☆15Updated 4 years ago
Alternatives and similar repositories for armswideopen
Users that are interested in armswideopen are comparing it to the libraries listed below
Sorting:
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆53Updated 3 years ago
- Helps to find patched modules☆30Updated 5 years ago
- Single header code that sets any section's page to No Access☆11Updated 3 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14Updated 5 years ago
- A debugger library using VEH.☆65Updated last year
- Kernel ReClassEx☆65Updated 2 years ago
- VMP Mutation API Fix☆43Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Updated 3 years ago
- This tool Decrypt and Extract the files from the EAC☆72Updated 3 months ago
- ☆47Updated 3 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- InfinityHookProMax: Make InfinityHook great great again☆48Updated 2 years ago
- page table manipulation to gain physical r/w☆42Updated last year
- ☆38Updated 2 years ago
- ☆26Updated 2 years ago
- ☆48Updated 5 years ago
- ☆72Updated 3 years ago
- Simple memory obfuscator.☆24Updated 3 years ago
- Load driver on boot before anti-cheats☆34Updated last year
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆129Updated 4 years ago
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆76Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆73Updated 4 years ago
- External memory library for Windows.☆53Updated 3 years ago
- ☆35Updated 3 years ago
- ☆42Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32Updated 3 years ago