sunnamed434 / UnityVulnerableEntryPoint
Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3
☆17Updated last year
Alternatives and similar repositories for UnityVulnerableEntryPoint:
Users that are interested in UnityVulnerableEntryPoint are comparing it to the libraries listed below
- ☆45Updated 2 years ago
- Utility that tries to generate every single CIL opcode possible in a valid context.☆27Updated 2 years ago
- A Command-Line Tool for Removing DotNetRuntimeDebugHeader from NativeAOT Published .NET PE Files.☆18Updated last year
- This tool Decrypt and Extract the files from the EAC☆63Updated last year
- ☆78Updated 3 years ago
- A Vulnerable PatchGuard Exploit that can be used to disable PatchGuard on Runtime.☆14Updated 7 months ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆46Updated 2 years ago
- ☆29Updated 4 months ago
- ☆27Updated last year
- My anti debugging collection in csharp☆34Updated 2 years ago
- Extracts the files embedded inside of a .NET AppHost.☆18Updated 5 months ago
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆19Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆28Updated 3 months ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆30Updated 3 months ago
- Helps to find patched modules☆27Updated 4 years ago
- Simple NtQuerySystemInformation hook for your hacking apps.☆40Updated 3 years ago
- Simulate SendInput with ClassService☆31Updated 6 years ago
- Devirtualizer for VirtualGuard Protector using AsmResolver☆39Updated last year
- ☆17Updated 9 months ago
- ☆30Updated 10 months ago
- Anti-anti-debug: reset ThreadHideFromDebugger☆14Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- Load driver on boot before anti-cheats☆30Updated 11 months ago
- Driver that communicates using a thread and a shared section with Usermode☆30Updated 4 months ago
- fecurity executor from factory☆33Updated 2 years ago
- Uses a driver to read/write process memory☆12Updated 4 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit…☆23Updated last year
- JITK - JIT Killer is hooker for clrjit☆29Updated 2 years ago