vic4key / Vutils
Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster, and simpler.
☆70Updated 8 months ago
Alternatives and similar repositories for Vutils:
Users that are interested in Vutils are comparing it to the libraries listed below
- BetaShield Windows x86 Ring3 Anticheat v2☆38Updated 8 years ago
- Hide function calls to prevent reverse-engineering☆69Updated 4 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- Debug Print viewer (user and kernel)☆66Updated last year
- Compile-Time Strings and Numbers Encryption for C++20☆43Updated 3 months ago
- ☆47Updated 4 years ago
- Library for linking multiple PE\PE + files to one☆51Updated last year
- A simple library which provides a way to read and write the memory of other processes☆51Updated 7 years ago
- A bunch of architectural headers for i386 and AMD64☆36Updated last year
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆31Updated 3 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆55Updated 2 years ago
- External memory library for Windows.☆51Updated 3 years ago
- A Simple Example☆21Updated 6 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆85Updated last year
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- PAGE_GUARD based hooking library☆44Updated 2 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Driver shared section communication☆50Updated last month
- Global DLL injector☆67Updated 3 years ago
- x64 syscall caller in C++.☆89Updated 6 years ago
- force delete runing .exe application file.or delete any locked file☆69Updated 2 years ago
- page table manipulation to gain physical r/w☆40Updated last year