ssnob / hidden_syscall_monitoringLinks
monitors hidden syscalls called from call of duty anticheat
β88Updated 11 months ago
Alternatives and similar repositories for hidden_syscall_monitoring
Users that are interested in hidden_syscall_monitoring are comparing it to the libraries listed below
Sorting:
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.β136Updated last year
- π¬ IDA plugin to find patched memoryβ76Updated last week
- Generate a PDB file given the old PDB file and an address mappingβ51Updated 5 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Libraryβ128Updated 4 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheatingβ49Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unautβ¦β131Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbolsβ57Updated 2 years ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.β73Updated 9 months ago
- ntoskrnl .data hooks for UM-KM communicationβ51Updated last year
- Integration of Microsoft Warbird with the MSVC compilerβ116Updated 2 years ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypassβ236Updated 2 months ago
- VMProtect2 Deobfuscation Toolingβ79Updated last month
- A set of LLVM and GCC based plugins that perform code obfuscation.β136Updated 2 months ago
- Header-only C++ library for producing PE files.β34Updated 2 years ago
- Load dll with undocumented functions and debug symbolsβ47Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEPβ60Updated last year
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy β¦β54Updated 8 months ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by sβ¦β63Updated 2 weeks ago
- β29Updated 2 weeks ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1β68Updated 4 months ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!β50Updated last month
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.β91Updated 2 months ago
- A x86_64 software emulatorβ160Updated 4 months ago
- RyΕ«jin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM toolβ280Updated last month
- Hook all callbacks which are registered with LdrRegisterDllNotificationβ96Updated 9 months ago
- An x86-64 code virtualizer for VM based obfuscationβ158Updated last year
- Rewrite and obfuscate code in compiled binariesβ273Updated 3 weeks ago
- Yet another IDA Pro/Home plugin for deobfuscating stack stringsβ114Updated 3 months ago
- Elevate arbitrary MSR writes to kernel execution.β42Updated 2 years ago
- β93Updated last year