scizzydo / memdump
Windows x64 PE process memory dumper to disk
☆35Updated 8 months ago
Alternatives and similar repositories for memdump:
Users that are interested in memdump are comparing it to the libraries listed below
- Full c# internal library for world of warcraft.☆28Updated 2 years ago
- ☆34Updated 3 weeks ago
- Binary dumps of World of Warcraft Classic...for educational purposes of course☆27Updated 3 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆115Updated 8 years ago
- Detect if a mouse event injected☆39Updated 7 years ago
- a free vt-x&ept debugger☆40Updated 3 years ago
- ☆16Updated 7 months ago
- Basic example of how to change the initial rights on a memory region during runtime.☆43Updated last year
- Remaps Wow & bypass CRC checks☆17Updated 4 years ago
- Wow Classic Scriptname IDA script☆9Updated 3 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆68Updated 5 years ago
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆21Updated last year
- ☆42Updated 6 years ago
- Iterate FUObjectArray->ObjObjects & FNamePool->Entries☆38Updated 2 years ago
- x64dbg plugin which removes anti-dumping and obfuscation techniques from the popular MMORPG game World of Warcraft.☆38Updated 3 years ago
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆38Updated 4 years ago
- World of warcraft classic TBC hack☆65Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- Simple and lightweight hypervisor for AMD processors☆29Updated 4 months ago
- A hypervisor hiding user-mode memory using EPT☆106Updated 7 years ago
- ☆25Updated 6 years ago
- ☆25Updated 7 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 2 years ago
- VMP Mutation API Fix☆41Updated 3 years ago
- ☆69Updated 3 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆91Updated 5 years ago
- ☆30Updated 2 years ago
- Example to execute code in a remote process using wndproc trick☆17Updated 8 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 6 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago