weak1337 / EvCommunicationLinks
☆18Updated 4 years ago
Alternatives and similar repositories for EvCommunication
Users that are interested in EvCommunication are comparing it to the libraries listed below
Sorting:
- ☆47Updated 4 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆24Updated 2 years ago
- UD overlay using SetWindowsHookEx☆16Updated 3 years ago
- ☆36Updated 5 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆15Updated 4 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Updated 4 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- ☆42Updated 3 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- ☆46Updated 3 years ago
- ☆17Updated 4 years ago
- Helps to find patched modules☆30Updated 4 years ago
- Stealing signatures from pe files☆17Updated 4 months ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Updated 4 years ago
- ☆12Updated 3 years ago
- ☆21Updated 3 years ago
- ☆28Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ☆13Updated 4 months ago
- ☆80Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- ☆18Updated 4 years ago
- ☆25Updated last year
- Kernel mode to user mode injector☆11Updated 5 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- Old way for blocking NMI interrupts☆27Updated 2 years ago
- UAC - Cheat developer platform☆28Updated 3 years ago