Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calling conventions. Written in C++17.
MIT License
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detect...
Shellcode injection technique. Given as C++ header, standalone Rust program or library.
This tool will allow you to spoof the return addresses of your functions as well as system functi...
Hook system calls, context switches, page faults and more.
Advanced Game Hacking Library for C, Modern C++, Rust and Python (Windows/Linux/FreeBSD) (Process...
Penetration testing utility and antivirus assessment tool.
library for importing functions from dlls in a hidden, reverse engineer unfriendly way
windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers an...
C++ Faking library, which allows faking/mocking regular functions, static member functions and no...
C++20, x86/x64 Hooking Libary v2.0
RumbleFighter GameGuard bypass written with C++ 11 using win32