zhitkur / Polykur
☆6Updated 3 years ago
Alternatives and similar repositories for Polykur:
Users that are interested in Polykur are comparing it to the libraries listed below
- ☆18Updated 4 years ago
- Fuck Apex First Version☆10Updated 4 years ago
- UD overlay using SetWindowsHookEx☆16Updated 3 years ago
- ☆21Updated 2 years ago
- ☆21Updated 2 years ago
- ☆8Updated 3 years ago
- Passthrough anti-cheat with this kernel-driver based on guided hacking tutorial☆9Updated 3 years ago
- Adopted SRL-6 mouse movement to C++☆30Updated 4 years ago
- Kernel mode to user mode injector☆10Updated 5 years ago
- A project written in C++ to get hardware info on a Windows PC. Interfaces with the Windows Management Instrumentation (WMI) service to qu…☆10Updated 3 years ago
- C/C++ example of InjectMouseInput function☆32Updated 4 years ago
- ☆17Updated 4 years ago
- ☆10Updated 4 years ago
- pepex hack☆9Updated 3 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆23Updated 2 years ago
- ☆46Updated 3 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆46Updated 4 years ago
- communicate with kernel using a image on disk☆15Updated last year
- ☆30Updated 2 years ago
- ☆18Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- Used in tandem with a spoofer of your choosing, this will "clean" the trace files that MW uses after an HWID ban or shadowban☆12Updated last year
- working injector bp (BE EAC & VANGUARD)☆36Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆19Updated last year
- ☆14Updated 3 years ago
- squad internal simple base☆15Updated last year
- ☆22Updated 3 years ago
- ☆26Updated 3 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago