vic4key / Vutils
Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster, and simpler.
☆68Updated last week
Related projects: ⓘ
- Hide function calls to prevent reverse-engineering☆64Updated 3 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆51Updated 2 years ago
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆57Updated 5 years ago
- BetaShield Windows x86 Ring3 Anticheat v2☆34Updated 7 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆63Updated 3 years ago
- Debug Print viewer (user and kernel)☆63Updated 7 months ago
- ☆45Updated 3 years ago
- PAGE_GUARD based hooking library☆38Updated 2 years ago
- A simple library which provides a way to read and write the memory of other processes☆48Updated 6 years ago
- A wrapper class to hide the original calling address of a function☆54Updated 4 years ago
- X86/X64 Hardware Breakpoint Manager☆39Updated 3 years ago
- x64 syscall caller in C++.☆84Updated 6 years ago
- Library for linking multiple PE\PE + files to one☆46Updated 6 months ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆28Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆58Updated 3 years ago
- scans through physical memory and paging tables in kernel mode☆104Updated 3 years ago
- Binary rewriter for 64-bit PE files.☆40Updated 7 months ago
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆98Updated last year
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆50Updated 2 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆53Updated 4 years ago
- ☆50Updated this week
- A simple anti debug program (with kernel mode callbacks)☆42Updated 3 years ago
- ☆53Updated this week
- Code injection by hijacking threads in Windows 32-bit applications☆42Updated 5 years ago
- A bunch of architectural headers for i386 and AMD64☆31Updated 11 months ago
- Two PoC of accessing process virtual memory via NT Kernel☆24Updated 3 years ago
- ☆50Updated this week
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆23Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆30Updated 3 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆51Updated last year