vmcall / ayyxamLinks
Bypass for The Digital Exam Monitor developed by the Danish Ministry of Education (Den Digitale Prøvevagt) and ExamCookie
☆107Updated 6 years ago
Alternatives and similar repositories for ayyxam
Users that are interested in ayyxam are comparing it to the libraries listed below
Sorting:
- ☠️ Call of Duty - Vulnerabilities and proof-of-concepts☆310Updated 6 years ago
- This project aims to facilitate debugging a kernel driver in windows by adding support for a code change on the fly without reboot/unload…☆170Updated 2 years ago
- x64 usermode rootkit☆208Updated 7 years ago
- ROP based CSGO, BF3, BF4 cheat☆558Updated 5 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117Updated 5 years ago
- (Ab)using the XIGNCODE3 driver to open a handle to any process.☆64Updated 7 years ago
- CS:GO DMA Cheat (caution, seems to be detected by ESEA and FaceIt)☆237Updated 7 years ago
- C++ Self Modifying Code (Self Assembing/Disassembling)☆73Updated 5 years ago
- A tool for reconstructing data types based on memory - [Outdated; use ReClassEx]☆125Updated 11 years ago
- A port of DrunkenCheetah's Project to x64☆76Updated 11 years ago
- The source code to my defuse.ca website.☆72Updated last week
- Psychological warfare in reverse engineering☆198Updated 7 years ago
- External Counter Strike: Global Offense aimbot written in C#. This aimbot is unique in that it simulates mouse movement instead of modify…☆28Updated 11 years ago
- Capcom driver exploit wrapper☆128Updated 6 years ago
- x86-64 virtual machine and disassembler☆147Updated 6 years ago
- Detect manualmapped images remotely, without hassle☆152Updated 8 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- ☆56Updated 3 years ago
- Some cool game hacks☆20Updated 7 years ago
- VAC3 modules dumper☆44Updated 7 years ago
- Patches the Microsoft Linker so that it produces executables without the 'Rich' header☆40Updated 2 years ago
- https://nvd.nist.gov/vuln/detail/CVE-2021-30481☆58Updated 4 years ago
- ☆36Updated 4 years ago
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆74Updated 7 years ago
- Maintaining an official release at http://split-code.com/cda.html . Tool for recording, filtering, and hacking function calls within appl…☆66Updated 11 years ago
- ☆108Updated 7 years ago
- Recreation of GetProcAddress without external dependencies on Windows Libraries☆90Updated 9 years ago
- Plugin of x64dbg to help you analyze object-oriented applications☆25Updated 5 years ago
- Simple benchmark for findpattern implementations.☆162Updated 10 months ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆147Updated 7 years ago