weak1337 / ricochet_deobfuscator
☆49Updated 3 years ago
Alternatives and similar repositories for ricochet_deobfuscator:
Users that are interested in ricochet_deobfuscator are comparing it to the libraries listed below
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆50Updated 2 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- A lightweight BattlEye emulator of the launcher☆58Updated 2 years ago
- ☆40Updated 3 years ago
- Attempts to decrypt JM Xorstr in some x64 binaries☆50Updated last year
- ☆78Updated 3 years ago
- ☆66Updated 2 years ago
- ☆45Updated 2 years ago
- Hardware ID☆29Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆65Updated last year
- Known ring3 memory protections that can be handled at a simple level.☆63Updated 2 years ago
- This tool Decrypt and Extract the files from the EAC☆63Updated last year
- ☆48Updated last year
- Modmap updated to work on Windows 11☆28Updated 3 years ago
- A proof of concept demonstrating communication via mapped shared memory structures between a user-mode process and a kernel-mode payload …☆77Updated 3 years ago
- mouseclassservicecallback detection via hook☆49Updated 2 years ago
- Single header code that sets any section's page to No Access☆11Updated 2 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- C++ BattlEye anticheat-emulator☆27Updated 2 years ago
- ☆50Updated 4 years ago
- ☆44Updated 4 years ago
- game dumper☆43Updated 4 years ago
- An Undetected BE Kernel Driver I developed, Will probably be detected upon releasing this but can be made undetected very easily. Does no…☆64Updated 4 months ago
- ☆50Updated 2 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆73Updated last year
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆53Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆72Updated last year
- ☆41Updated 2 years ago
- Extracts eac's driver at runtime without it touching the disk.☆33Updated last year
- x64 manual mapper using inline syscalls☆7Updated 3 years ago