ssnob / hidden_syscall_monitoringLinks
monitors hidden syscalls called from call of duty anticheat
☆86Updated 10 months ago
Alternatives and similar repositories for hidden_syscall_monitoring
Users that are interested in hidden_syscall_monitoring are comparing it to the libraries listed below
Sorting:
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆130Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 months ago
- 🔬 IDA plugin to find patched memory☆73Updated last month
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆45Updated last year
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆89Updated last month
- Simple, fast and lightweight Header-Only C++ Assembler Library☆129Updated 3 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆218Updated last week
- A set of LLVM and GCC based plugins that perform code obfuscation.☆133Updated last month
- Usermode exploit to bypass any AC using a 0day shatter attack.☆132Updated this week
- Load dll with undocumented functions and debug symbols☆47Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆74Updated 8 months ago
- Integration of Microsoft Warbird with the MSVC compiler☆114Updated 2 years ago
- A universal binary patching dll.☆113Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆68Updated 2 months ago
- Header-only C++ library for producing PE files.☆35Updated 2 years ago
- ☆28Updated last month
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆211Updated 3 weeks ago
- Virtual Trust Level (VTL 1) secure call tracing☆83Updated 3 months ago
- A x86_64 software emulator☆156Updated 3 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- Finding Truth in the Shadows☆119Updated 2 years ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆70Updated last month
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆99Updated 6 months ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆54Updated 6 months ago
- Rewrite and obfuscate code in compiled binaries☆266Updated last month
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆59Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆129Updated 2 years ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆50Updated last week
- An x86-64 code virtualizer for VM based obfuscation☆143Updated 11 months ago