thereals0beit / D3DHookLinks
Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!
☆33Updated 11 years ago
Alternatives and similar repositories for D3DHook
Users that are interested in D3DHook are comparing it to the libraries listed below
Sorting:
- anti-cheat based on user-mode tricks and undocumented methods☆25Updated 8 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 7 years ago
- Spoof Windows Test Signing Mode☆29Updated 7 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Updated 11 years ago
- Wow64 syscall hook☆42Updated 8 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆24Updated 11 months ago
- Use the Cheat Engine driver in your own process!☆25Updated 7 years ago
- A Windows driver used to facilitate DLL injection☆27Updated 8 years ago
- My take on the capcom driver vulnerability☆28Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27Updated 11 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Updated 11 years ago
- An ark tool's driver☆40Updated 8 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 8 years ago
- Mouse emulation driver for Windows 10 x64☆30Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 9 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆25Updated 9 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆21Updated 9 years ago
- A Windows game hacking framework☆41Updated 9 years ago
- Analyze PatchGuard☆57Updated 7 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Updated 11 years ago
- ☆27Updated 8 years ago
- Modify process handle permissions☆62Updated 9 years ago
- Pe-protector protects executable files.☆52Updated 4 years ago
- Shareds for kernel developement☆29Updated 12 years ago
- MIR-Engine☆24Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Updated 8 years ago
- New handle stealing technique for windows apps☆13Updated 8 years ago
- by others☆39Updated 7 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago