☆43Oct 19, 2021Updated 4 years ago
Alternatives and similar repositories for BEShellcodeDumper
Users that are interested in BEShellcodeDumper are comparing it to the libraries listed below
Sorting:
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Code for Battleyes shellcode☆239Nov 11, 2021Updated 4 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- ☆136Aug 6, 2022Updated 3 years ago
- Manual map injection complete with a secure login system.☆10Mar 30, 2020Updated 5 years ago
- ☆84Apr 1, 2022Updated 3 years ago
- ☆53Oct 16, 2021Updated 4 years ago
- spoof page-table-entry nx bit☆10Feb 16, 2022Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- ☆37May 21, 2022Updated 3 years ago
- undetected eac mapper☆170May 3, 2022Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Mar 16, 2021Updated 4 years ago
- ☆36Mar 27, 2022Updated 3 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆22Oct 3, 2022Updated 3 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- base for testing☆186Sep 28, 2024Updated last year
- ☆14Aug 26, 2021Updated 4 years ago
- ☆23Oct 18, 2021Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- BattlEye shellcodes tester☆151Jan 3, 2022Updated 4 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆550Nov 12, 2022Updated 3 years ago
- VMProtectTest☆40Feb 16, 2023Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆235Dec 21, 2021Updated 4 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆470Jan 3, 2022Updated 4 years ago
- A mapper that maps shellcode into loaded large page drivers☆324Apr 26, 2022Updated 3 years ago
- mono fully external lib☆75Nov 23, 2025Updated 3 months ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆83Nov 5, 2023Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- ☆18Jun 13, 2022Updated 3 years ago
- noob hooking dwm for overlay☆84Nov 24, 2020Updated 5 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Sep 3, 2023Updated 2 years ago