vRare / AutoSpitta-x64Links
Mouse emulation driver for Windows 10 x64
☆30Updated 8 years ago
Alternatives and similar repositories for AutoSpitta-x64
Users that are interested in AutoSpitta-x64 are comparing it to the libraries listed below
Sorting:
- Modify process handle permissions☆61Updated 9 years ago
- ☆27Updated 8 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆25Updated 8 years ago
- by others☆39Updated 7 years ago
- Kernel Inject Process☆11Updated 8 years ago
- My take on the capcom driver vulnerability☆28Updated 8 years ago
- An ark tool's driver☆40Updated 8 years ago
- Spoof Windows Test Signing Mode☆29Updated 7 years ago
- ☆27Updated 8 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 7 years ago
- Players' Unknown Battleground Vulnerabilities Test PoC☆18Updated 6 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆14Updated 6 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- A tool to dump informations about the caller of a function.☆13Updated 9 years ago
- ☆15Updated last year
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 7 years ago
- New handle stealing technique for windows apps☆13Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆26Updated 11 years ago
- A Windows game hacking framework☆40Updated 9 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Updated 8 years ago
- Complete environement for network injected reversing☆21Updated 8 years ago
- D3D/DirectX Model recognition values for multiple games, used to create wallhack or chams☆24Updated 8 years ago
- NT reversal☆25Updated 7 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 11 years ago
- old code from 2007/2008 which uses split TLB to trace OEP☆16Updated 7 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Updated 7 years ago
- ☆44Updated 7 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago