shavitush / vfptr_swapLinks
Single-header VMT hook class using vfptr swap method
☆10Updated 2 years ago
Alternatives and similar repositories for vfptr_swap
Users that are interested in vfptr_swap are comparing it to the libraries listed below
Sorting:
- (also old project) Contains working manual mapping from a remote server (without exceptions), hybrid encryption (needs to be corrected), …☆19Updated 4 years ago
- ☆38Updated 8 years ago
- 🥭windows memory library aimed towards game hacking☆40Updated 5 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- ☆31Updated 7 years ago
- A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory…☆58Updated 4 years ago
- POC of integrity checks☆11Updated 4 years ago
- A plugin for x64dbg that can copy RVA from unknown memory pages☆34Updated 3 years ago
- Ironsight Internal Multihack☆40Updated last year
- process dumper targeting CS:GO internal cheats☆24Updated 3 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- driver manual mapper☆28Updated 5 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- A small wrapper class providing an unified interface to search for various memory signatures☆80Updated 3 years ago
- ☆49Updated 5 years ago
- ☆47Updated 4 years ago
- ☆26Updated 3 years ago
- ☆73Updated 5 years ago
- Memory integrity check with CRC32 instruction, section-based☆44Updated last week
- sample bypass anti-anti-debug tool by race condition☆25Updated 2 years ago
- ☆42Updated 6 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Base for SE2013(and close relatives).☆15Updated 3 years ago
- ☆30Updated 7 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆46Updated 4 years ago
- DirectX9 Overlay, C++.☆24Updated 4 years ago
- Simple tool deobfuscating a Modern Warfare dump so IDA can analyse it right way (and faster).☆22Updated 3 years ago
- ☆18Updated 4 years ago
- ☆46Updated 3 years ago
- manually mapping the dll image into the process, dividing the image into parts of 0x1000 bytes and writing them in random order, which co…☆13Updated 2 years ago