awesome-game-security
![圖像](https://images.downcodes.com/uploads/20250207/img_67a560ed9d2a430.png)
![圖像](https://images.downcodes.com/uploads/20250207/img_67a560ed9d6d531.png)
If you find that some links are not working, you can simply replace the username with gmh5225.
Or you can send an issue for me.
如何做出貢獻?
- https://github.com/hinuncafe/contribute-practice
- https://docs.github.com/en/get-started/quickstart/contributing-to-projects
內容
- 遊戲引擎
- 數學
- 渲染器
- 3D圖形
- 人工智慧
- 圖像編解碼器
- 波前OBJ
- 任務調度程序
- 遊戲網絡
- Physx SDK
- 遊戲發展
- 遊戲資產
- 遊戲熱補丁
- 遊戲測試
- 遊戲工具
- 遊戲經理
- 遊戲CI
- Web3遊戲
- DirectX
- OpenGL
- VULKAN
- 欺騙
- 反作弊
- 一些技巧
- Windows安全功能
- WSL
- WSA
- Windows模擬器
- Android模擬器
- iOS模擬器
- 遊戲男孩
- 任天堂開關
- Xbox
遊戲引擎
指導
- https://github.com/qianmo/game-programmer-study-notes
- https://github.com/stevinz/awesome-game-engine-dev [很棒的遊戲引擎開發]
- https://github.com/gforcex/opengraphic [圖形引擎和遊戲引擎列表]
- https://github.com/bobeff/open-source-engines [開源遊戲引擎列表]
- https://github.com/thisisgame/cpp-game-engine-book
- https://github.com/netwarm007/gameenginefromscratch
- https://forums.unrealengine.com [虛幻]
- https://docs.unrealengine.com [虛幻]
- https://www.unrealengine.com/resources [brean deal]
- https://github.com/donaldwuid/unreal_source_explained [noreal]
- https://github.com/mikeroyal/unreal-engine-guide [noreal]
- https://github.com/allar/ue5-style-guide [noreal]
- https://github.com/revan1611/ue-interview-cheat-sheet [breal]
- https://github.com/tomlooman/ue4-tutorials [Unreal]
- https://github.com/jaredp94/unreal-development-guides-and-tips [noreal]
- https://github.com/lettier/3D-game-shaders-for-beginners [Shader]
- https://github.com/pardcode/opengl-3d-game-tutorial-series [OpenGL]
- https://github.com/pardcode/cpp-3d-game-tutorial-series [directx]
- https://github.com/ssloy/tinyrenderer [Render]
- https://github.com/crasyshader/gamedev [Unity]
- https://github.com/ryannielson/awesome-unity [Unity]
- https://github.com/shadirvan/unity-cheat-neet [Unity]
- https://github.com/qianmo/unity-design-pattern [Unity Design]
- https://github.com/whx-prog/the-seed-link-future [Unity VR]
- https://github.com/twohyjr/metal-game-engine-tutorial [Apple's Metal API]
來源
- https://github.com/epicgames/unrealengine
- https://github.com/unity-technologies/unitycsreference [C#參考]
- https://github.com/cocos2d/cocos2d-x
- https://github.com/cocos/cocos-engine
- https://github.com/gmh5225/gameengine-cryengine
- https://github.com/panda3d/panda3d
- https://github.com/valvesoftware/source-sdk-2013
- https://github.com/gmh5225/source-sdk-orangebox
- https://github.com/utinka/source-engine.2003
- https://github.com/vses/sourceengine2007
- https://github.com/nillerusr/source-engine
- https://github.com/gmh5225/goldsourcerebuild [Goldsource Engine Rebuild]
- https://github.com/adriengivry/overload
- https://github.com/gmh5225/gameengine-mapleengine
- https://github.com/inanevin/linaengine
- https://github.com/storm-devs/storm-engine
- https://github.com/minetest/minetest
- https://github.com/godotengine/godot
- https://github.com/scriptedsnark/regs
- https://github.com/nem0/lumixengine
- https://github.com/urho3d/urho3d
- https://github.com/korokengine/korok [golang]
- https://github.com/boomingtech/pilot
- https://github.com/sirkles/joshoengine-native
- https://github.com/explosionengine/explosion
- https://github.com/danhuynh0803/campfire
- https://github.com/lowenware/dotrix [Rust]
- https://github.com/bevyengine/bevy [Rust]
- https://github.com/fyroxengine/fyrox [Rust]
- https://github.com/ambientrun/ambient [Rust]
- https://github.com/abyssengine/abyssengine [arpg]
- https://github.com/skylicht-lab/skylicht-engine
- https://github.com/valvesoftware/halflife [Half-Life 1]
- https://github.com/samvanheer/halflife-unified-sdk [Half-Life SDK]
- https://github.com/alliedmodders/hl2sdk [Half-Life SDK]
- https://github.com/ezhangle/hlmaster [Half-Life Master Server]
- https://github.com/monogame/monogame [.net]
- https://github.com/vchelaru/flatredball [.net 2d]
- https://github.com/ncine/ncine [2d]
- https://github.com/gameplay3d/gameplay [2D/3D]
- https://github.com/noelfb/blah [C ++ 2D]
- https://github.com/squalr/squally [C ++ 2D]
- https://github.com/u3d-community/u3d [C ++ 2D/3D]
- https://github.com/turbulenz/turbulenz_engine [html5]
- https://github.com/melonjs/melonjs [html5]
- https://github.com/egret-labs/egret-core [html5]
- https://github.com/pixijs/pixijs [html5]
- https://github.com/torquegameengines/torque2d [2d]
- https://github.com/torquegameengines/torque3d [3D]
- https://github.com/gmh5225/gameengine-cx3d [3d]
- https://github.com/solenum/exengine [C99 3D]
- https://github.com/thecherno/hazel
- https://github.com/duddel/yourgamelib
- https://github.com/serious-engine/base
- https://github.com/benanil/castle-engine [dx11]
- https://github.com/openarena/Engine [Quake3]
- https://github.com/rbfx/rbfx [C#支持和Wysiwyg編輯器]
- https://github.com/bobbyanguelov/esoterica
- https://github.com/zdoom/gzdoom [doom]
- https://github.com/l-spiro/l.-spiro-engine-2022
- https://github.com/mohitsethi99/arcengine
- https://github.com/gsecte/nebula
- https://github.com/irisengine/iris [Cross-Platform C ++]
- https://github.com/wistfulhopes/nightskyengine [用虛幻引擎寫的格鬥遊戲引擎5]
- https://github.com/obengine/obengine [2d+lua]
- https://github.com/harukumo/horizonengine [3D渲染引擎]
- https://github.com/benjinx/toon [C ++]
- https://github.com/chrismaltby/gb-studio [gameboy]
- https://github.com/orx/orx [C ++]
- https://github.com/volcoma/etherealengine [C ++]
- https://github.com/clibequiliblium/equilibriumengine [C ++]
- https://github.com/turanszkij/wickedengine [C ++ 3D]
- https://github.com/austinbrunkhorst/ursine3d [C ++ 3D]
- https://github.com/ravengine/ravengine [C ++ 3D]
- https://github.com/asc-community/mxengine [C ++ 3D]
- https://github.com/jmorton06/lumos [C ++ 2D/3D]
- https://github.com/fredakilla/gplayengine [C ++ 2D/3D]
- https://github.com/crownengine/crown [C ++ 2D/3D]
- https://github.com/flaxengine/flaxengine [C ++/C#3D]
- https://github.com/stride3d/stride [C#3D]
- https://github.com/net5f/amalgamengine
- https://github.com/rxi/kit [Pixels]
- https://github.com/isadorasophia/murder [Pixel]
- https://github.com/nitaigao/engine-Showcase [舊引擎]
- https://github.com/panosk92/spartanengine [用於實時解決方案設計的研究 - 引用遊戲引擎]
- https://github.com/openxray/xray-16 [X射線引擎的改進版本]
- https://github.com/love2d/love [lua的2D遊戲框架]
- https://github.com/pixelguys/cubyz [3D Voxel Sandbox遊戲由Zig語言寫]
遊戲引擎插件:虛幻
- UE4的插件到用戶騎手用於虛幻引擎作為代碼編輯器
- 用於腳本遊戲的設計 - 敏捷節點系統在虛幻引擎中的流程
- 樣本虛幻引擎5.0.1 C ++項目,該項目包含親愛的Imgui
- 使用IMGUI與虛幻引擎項目一起使用的一組工具和實用程序
- 一個簡單的虛幻引擎子系統,為客戶提供更準確的服務器世界時間
- UE4 UI紋理驗證器插件
- 虛幻引擎.NET 6集成
- Houdini引擎插件用於虛幻引擎
- 一個小型教程存儲庫,用於捕獲從Unrealengine到磁盤的語義註釋的圖像
- LIVE2D模型的UE4插件
- 一個虛幻的引擎代碼插件,該插件將自定義資產類型和編輯器添加到引擎
- 虛幻引擎4用於LUA API實施的插件
- Unrealengine的調試菜單4
- “親愛的imgui”遠程訪問庫和應用程序
- 可自定義的性能度量圖表和統計命令控制面板
- 虛幻的引擎插件提供了一組愛馬仕終點
- 虛幻引擎4用於LUA API實施的插件
- 將參數字符串複製到剪貼板並輸出複製到剪貼板的字符
- UE4的通用圖數據結構插件
- 快速實施“ BTS”測試的模塊化遊戲功能
遊戲引擎插件:Unity
- 團結的降價查看器
- 用於統一的綜合解決方案
- 維護的有用和免費的統一腳本 /庫 /插件和擴展的集合
- 與Unity編輯器集成Chatgpt
遊戲引擎插件:Godot
- https://github.com/libriscv/godot-sandbox [沙盒,可為Godot Games提供安全的改裝]
遊戲引擎插件:Lumix
- https://github.com/nem0/lumixengine_maps [地圖下載器]
遊戲引擎探測器
- https://github.com/walzer/game-engine-detector [手機遊戲]
數學
- https://github.com/nfrechette/rtm
- https://github.com/groovounet/glm
- https://github.com/microsoft/directxmath
- https://github.com/kazade/kazmath
- https://github.com/milakov/int_fastdiv
- https://github.com/freemint/fdlibm
- https://github.com/jaysmito101/cgl
渲染器
- https://github.com/bkaradzic/bgfx [渲染庫]
- https://github.com/diligentgraphics/diligentengine [渲染庫]
- https://github.com/kanition/pbrtbook [基於物理的渲染:從理論到實施]
- https://github.com/keith2018/softglrender
- https://github.com/dqlin/volumetrricrestirrease
- https://github.com/hackerpoet/noneuclidean
- 旨在在CPU上的單個線程上運行的圖形引擎
- https://github.com/paroj/gltut [OpenGL渲染]
- https://github.com/ashawkey/raytracing [raytracer]
- https://github.com/sultim-t/xash-rt [xash3d fwgs帶有實時路徑跟踪]
- https://github.com/crosire/reshade [遊戲和視頻軟件的通用後處理器]
- https://github.com/harukumo/horizonengine [3D渲染引擎]
- https://github.com/patryk27/strolle [實時渲染引擎]
- https://github.com/ssloy/tinyraytracer [簡短的計算機圖形/渲染課程]
- https://github.com/freetype/freetype [渲染字體]
- https://github.com/methanepowered/methanekit [DirectX 12,Metal&Vulkan]
3D圖形
- https://github.com/mesa3d/mesa
- https://github.com/methanepowered/methanekit [DirectX 12,Metal&Vulkan]
人工智慧
- https://github.com/ls361664056/gameai-paper-list [ZH]
圖像編解碼器
- https://github.com/nothings/stb
- https://github.com/libjpeg-turbo/libjpeg-turbo
- https://github.com/erkkah/tigr
- https://github.com/tsoding/olive.c
波前OBJ
- https://github.com/tinyobjloader/tinyobjloader
- https://github.com/twinklebear/tobj [Rust]
任務調度程序
- https://github.com/sergeymakeev/taskscheduler
遊戲網絡
指導
- https://github.com/mfatihmar/game-networking-resources
- https://partner.steamgames.com/doc/api/isteamnetworkingMessages #functions_sendrecv [steam]
- https://github.com/mcxiaoke/mqtt [mqtt]
來源
- https://github.com/cloudwu/skynet
- https://github.com/ketoo/noahgameframe [服務器引擎]
- https://github.com/chronoxor/cppserver
- https://github.com/qihoo360/evpp
- https://github.com/valvesoftware/gamenetworkingsockets [Steam]
- https://github.com/skywind3000/kcp [kcp]
- https://github.com/unit-x/kcp-cpp [kcp]
- https://github.com/tleonarduk/ds3os [Dark Souls 3]
- https://github.com/tleonarduk/ds2os [Dark Souls 2]
- https://github.com/rathena/rathena [mmorpg]
- https://github.com/trinitycore/trinitycore [WOW的服務器]
- https://github.com/unetworking/uwebsockets [WebSockets]
- https://github.com/socketio/socket.io [nodejs]
- https://github.com/mqttjs/mqtt.js [mqtt nodejs]
- https://github.com/eclipse/paho.mqtt.cpp [mqtt cpp]
- https://github.com/topfreegames/pitaya [服務器框架]
- https://github.com/azerothcore/azerothcore-wotlk [for WOW]
- https://github.com/arlyon/azerust [Rust Server for Wow]
- https://github.com/arlyon/awesome-wow-rust [Rust Server for Wow]
- https://github.com/2601677867/ One-click-run_source_server [源引擎的服務器]
Physx SDK
- https://github.com/nvidiagameworks/physx
- https://github.com/nvidiagameworks/physx-3.4
- https://github.com/bulletphysics/bullet3
遊戲發展
指導
- https://github.com/calinou/awesome-gamedev
- https://github.com/notpresident35/learn-awesome-gamedev
- https://github.com/yrgo/awesome-educational-games
- https://github.com/bobeff/open-source-games [開源遊戲列表]
- https://github.com/michelpereira/awesome-open-source-games [遊戲集合]
- https://github.com/raizam/gamedev_libraries [gamedev的開源C/C ++庫的集合]
- https://github.com/gheja/game-design-documents [遊戲設計文檔]
- https://github.com/kavex/gamedev-sources [遊戲開發資源]
- https://github.com/crasyshader/gamedev [Unity]
- https://github.com/ryannielson/awesome-unity [Unity]
- https://github.com/qianmo/unity-design-pattern [Unity Design]
- https://github.com/michal-z/zig-gamedev [Ziglang的建築遊戲開發生態系統]
- https://github.com/otfcg/awesome-game-analysis [視頻遊戲技術分析資源]
- https://github.com/killop/anything_about_game [遊戲開發資源]
- https://github.com/tastsong/gameprogrammerstudynotes [遊戲開發註釋]
- https://github.com/p0l3naruba/gtav-sourcecode-build-guide [gta v源代碼構建教程]
來源
- https://github.com/pimonfeed/csgo-src [洩漏的CSGO]
- https://github.com/perilouswithadallarsign/cstrike15_src [用CI洩露CSGO]
- https://github.com/gmh5225/far-cry-1-source-full [洩漏遠哭1]
- https://github.com/gmh5225/farcry [洩漏cry 1]
- https://github.com/swagsoftware/kisak-strike [開源CSGO]
- https://github.com/hampta/csso-src [csgo mod]
- https://github.com/thomaseichhorn/cs16-client [重寫CS1.6]
- https://github.com/s1lentq/regamedll_cs [反向CS1.6]
- https://github.com/velaron/cs16-client [反向CS1.6]
- https://github.com/source2ze/cs2fixes [CS2 mod]
- https://github.com/gmh5225/game-gta-re3 [反向GTA III,副城市]
- https://github.com/gta-reversed/gta-reversed-modern [GTA的重新實現:SA 1.0 US]
- https://github.com/wastedhymn/grand-theft-auto-modding-source [vice City的代碼片段]
- https://github.com/smileyag/reczds [反向Czeror]
- https://github.com/harrison1/unrealcpp [UE4 C ++示例]
- https://github.com/qianmo/ue4-fps-game [UE4 FPS遊戲]
- https://github.com/kitchengun/ue4_fps [UE4 FPS演示]
- https://github.com/tomlooman/simplefpstemplate [UE4 FPS演示]
- https://github.com/tomlooman/epicsurvivalgame [UE4 FPS遊戲]
- https://github.com/qianmo/ue4-tank-game [UE4遊戲]
- https://github.com/ue-demo/ue-ue-ue5-fps-wlaster [UE5 FPS遊戲]
- https://github.com/gmh5225/ue5-fps-cryptraider [UE5 FPS遊戲]
- https://github.com/leroytechnologies/projectm [UE5 FPS遊戲]
- https://github.com/invi1998/multiplayerblastergame [UE5 FPS遊戲]
- https://github.com/druidmech/multiplayercourseblastergame [UE5 FPS遊戲]
- https://github.com/caydenbullock/ue5multiplayerproject [ue5 horror遊戲與抗欺騙]
- https://github.com/perfect hand/ue5-cardgame [UE5卡遊戲]
- https://github.com/stackoverflower92/fightinggame-ue5 [UE5格鬥遊戲]
- https://github.com/gmh5225/unrealengine5-ultimatestreetetfighters [UE5 Street-Fighters Game]
- https://github.com/evelynschwab/componentfusemechanic [UE5約束系統]
- https://github.com/cobracodedev/tp_2dsidescrollerbp [UE5 2D模板]
- https://github.com/gmh5225/ue5-roll-a-ball-game [ue5滾球遊戲]
- https://github.com/tomlooman/actionroguelike [ue roguelike遊戲]
- https://github.com/unity-technologies/fpssample [Unity Game]
- https://github.com/oguzkaira/fps-movement [Unity FPS]
- https://github.com/oguzkaira/sqlite-unity3d [unity sqlite]
- https://github.com/swordjoinmagic/mobademo [Unity MOBA]
- https://github.com/gmh5225/u3d_minidnf [Unity Mini dnf]
- https://github.com/gmh5225/unity-vrchat-template [Unity vrchat模板]
- https://github.com/saukiya/arknights [Unity arknights]
- https://github.com/zehmatt/snakeroyal [帶服務器的迷你游戲]
- https://github.com/mkxjun/super-fighter [dx11 mini遊戲]
- https://github.com/mkxjun/rubik-cube [dx9/11 mini遊戲]
- https://github.com/suprcode/mir2 [mir2]
- https://github.com/suprcode/mir3-zircon [mir3]
- https://github.com/wolfiregames/overgrowth [過度生長]
- https://github.com/solidi/hl-mods [半身修改]
- https://github.com/codingben/maple-fighters [類似於Maplestory的小型在線遊戲]
- https://github.com/gmh5225/winapi_maplestory [Winapi Maplestory]
- https://github.com/zeromaxhe/maplestorycopy [godot maplestory]
- https://github.com/loqix/fortnite [fortnite]
- https://github.com/bradharding/doomretro [doom]
- https://github.com/daivuk/puredoom [doom]
- https://github.com/nsg650/ntdoom [doom在NT內核中運行]
- https://github.com/luxon98/super-mario-bros-game [超級馬里奧的翻拍]
- https://github.com/plibither8/2048.cpp [2048]
- 過山車大亨的開源重新實施2
- 這是舊的天堂sprx bo2 soruce代碼
- https://github.com/dreamstalker/rehlds [反向工程HLDS]
- https://github.com/androidmodloader/androidmodloader [android mod loader]
- https://github.com/marblexu/pythonplantsvszzbies [PlantvszOmbies]
- https://github.com/mhyousefi/zombiesvsplants [PlantvsZombies]
- https://github.com/fewnity/counter-strike-ds-unity-project [Unity cs]
- https://github.com/fewnity/counter-strike-nintendo-ds [nintendo cs]
- https://github.com/ppy/osu [osu]
- https://github.com/ppy/osu-framework [osu]
- https://github.com/dufernst/legioncore-7.3.5 [哇]
- https://github.com/rageproject/5.4.7-wow-source [哇]
- https://github.com/skyfire/mopcore547 [哇]
- https://github.com/arctium/wow-launcher [wow啟動器]
- https://github.com/skmetinek/non-newtonian-new-york [蜘蛛俠修復mod]
- https://github.com/playgameservices/cpp-android-basic-samples [使用Google Play遊戲示例遊戲C ++ SDK]
- https://github.com/pafuhana1213/kawaiiphysics [簡單的虛假物理學4&5]
- https://github.com/pafuhana1213/vtuberwithue4 [ue4 vtuber]
- https://github.com/bratah123/gojothespire [殺死了尖頂修復的mod]
- https://github.com/snesrev/zelda3 [Zelda 3的重新實現]
- https://github.com/kantam5/deadbydaylight [Dead by Daylight副本]
- https://github.com/phobos-developers/phobos [紅色警報2:Yuri的複仇引擎擴展]
- https://github.com/praydog/automatamp [nier]
- https://github.com/xinyu-evolutruster/3d-racing-game [基於OpenGL的賽車遊戲]
- https://github.com/projectborealis/pbcharactermement [HL2-Style,在C ++中實現的UE4的經典FPS運動]
- https://github.com/merisho/tx-holdem [Dexas Holdem撲克由JS]
- https://github.com/raysan5/raylib [一個簡單易用的庫,可享受電子遊戲編程]
- https://github.com/notyetgames/warriorb [使用UE4的Dark-Souls(例如Action Platformer)]
- https://github.com/pjasicek/openclaw [Captain Claw(1997)Platformer]
- https://github.com/galaxyhaxz/devilution [反向偏差]
- https://github.com/assaultcube/ac [FPS遊戲]
- https://github.com/fishfolk/jumpy [像素樣式]
- https://github.com/jynew/jynew [Jinyonglegend]
- https://github.com/johndpope/pianogame [鋼琴遊戲]
- https://github.com/gmh5225/qqtang [qqtang]
- https://github.com/kvnxiao/storytime [maplestory的翻拍]
- https://github.com/deathkiller/jazz2-native [jazz jackrabbit 2]
遊戲資產
- https://github.com/miziziziziz/retro3dgraphicsCollection
- https://github.com/hitmanhimself/gowtool [2018年戰神]
- https://github.com/khronosgroup/gltf [Runtime 3D資產交付]
- https://github.com/syoyo/tinygltf [僅標頭C ++ 11 Tiny GLTF 2.0庫]
- https://github.com/atenfyr/uassetgui [查看和修改UE4遊戲資產]
- https://github.com/uetools/uetools [訪問,閱讀和挑選的UE4資產]
- https://github.com/atenfyr/uassetapi [低級別.NET庫,用於閱讀和寫作虛幻引擎遊戲資產]
遊戲熱補丁
- https://github.com/tencent/xlua
- https://github.com/tencent/injectfix
- https://github.com/focus-creative-games/hybridclr
遊戲測試
- https://github.com/unitytech/gamesteastautomatimationexample [有關如何在遊戲中進行測試自動化的收集想法]
- https://github.com/nowsprinting/unityautomatedqaexamples [Unity Automated QA指南]
- https://github.com/airtestproject/airtest [UI自動化框架]
- https://github.com/dendibakh/perf-ninja [績效分析]
- https://github.com/cookieplmonster/uptimefaker [檢測高PC正常運行時間]
- https://github.com/gametechdev/presentmon [圖形性能]
- https://github.com/gatling/gatling [服務器測試]
- https://github.com/aristocratos/btop [performance Monitor]
- https://github.com/celtoys/remotery [實時CPU/GPU Profiler]
- https://github.com/volkanite/push [Monitor GPU/CPU/RAM Performance]
- https://github.com/google/orbit [c/c ++性能profiler]
- https://github.com/wolfpld/tracy [C ++框架profiler]
- https://github.com/bombomby/optick [C ++ profiler for Games]
- https://github.com/romancetheheart/automation_examples [在虛幻編輯器中自動執行某些任務]
- https://github.com/daedalicentertainment/ue4-test-automation [促進使用虛幻引擎設置集成測試套件4 Gauntlet]
- https://github.com/denuvosoftwaresolutions/onlooker [收集和可視化過程樹的內存使用情況]
- https://github.com/milostosic/rprof [基於CPU範圍的分析庫]
- https://github.com/darknessfx/dfoundryfx [UE績效]
遊戲工具
- 在無邊界的窗戶中玩您最喜歡的遊戲;不再需要耗時的alt-tabs
- https://github.com/genymobile/scrcpy [顯示和控制您的Android設備]
- https://github.com/ryanjon2040/unreal-binary-builder [build ue source]
- https://github.com/ryanjon2040/unrealnetworkprofiler [UE的網絡profiler]
- 用於獲取最新或特定版本Unity下載URL的命令行工具
- https://github.com/recastnavigation/recastnavigation [遊戲的導航 - 網絡工具集]
- https://github.com/tensorworks/ue-clang-format [ue clang-format配置]
- https://github.com/inflation/goldberg_emulator [蒸汽模擬器]
遊戲經理
- https://github.com/josefnemec/playnite
遊戲CI
- https://github.com/game-ci
- https://github.com/nikaera/unity-gameci-sample [Unity]
Web3遊戲
區塊鏈指南
- https://github.com/unbalencedparentes/practical_cryptography_and_distributed_ledgers [實用加密和分佈式分類帳]
- https://github.com/mush-support/mush-news [Mushnews-Web3 News Explorer]
- https://github.com/slowmist/web3-project-security-practice-requirements [Web3項目安全實踐要求]
- https://www.freeweb3resources.com [指南]
- https://github.com/yjjnls/awsome-blockchain [指南]
- https://github.com/ahmet/awesome-web3 [指南]
- https://github.com/matter-labs/awesome-zero-knowledge-Profords [ZKP指南]
- https://github.com/chaozh/awsome-blockchain-cn [CN指南]
- https://github.com/bekatom/awesome-ethereum [ETH指南]
- https://github.com/infectedism/solana-quick-start-guide [Solana快速入門指南]
- https://github.com/crytic/awesome-ethereum-security [很棒的以太坊安全]
- https://github.com/sigp/solity-security-blog [Solidity Security]
- https://github.com/m14r41/pentestingerverything/tree/main/blockchain%20pentesting [pentesting清單]
- https://github.com/ipsilon/eof [EVM對象格式]
- https://github.com/lilyjjo/mev_reading_list [資源列表以了解'mev'是什麼]
- https://en.hackndo.com/ethereum-virtual-machine [evm]
- https://github.com/mektigboy/evm-chad [evm]
- https://github.com/jtriley-eth/the-ethereum-virtual-machine [evm]
- https://github.com/w1nt3r-eth/evm-from-scratch [evm]
- https://github.com/shafu0x/evm-from-scratch-book [evm]
- https://github.com/4337mafia/awesome-account-abstraction [eip-4337]
- https://github.com/smlxl/evm.codes [evm opcodes Interactive參考]
- https://github.com/unboxed-software/solana-course [學習solana的完整課程]
- https://www.rareskills.io/solana-tutorial [Rareskills的Solana課程]
- https://github.com/lambdaclass/lambdaworks [crypto]
- https://github.com/preslavxyz/web3-security-researcher-roadmap [Web3安全研究人員路線圖]
- https://github.com/coinspect/learn-evm-attacks [EVM安全]
- https://github.com/x676f64/secureum-mind_map [evm Security]
- https://github.com/sunweb3sec/damn-vulnerable-defi-v4-solutions [defi Security]
- https://github.com/slowmist/SlowMist-Learning-Roadmap-for-becoming-a-a-smart-contract-ntract-auditor [智能合同審計技能的初學者路線圖]
- https://github.com/dapp-learning-dao/dapp-learning [dapp]
- https://github.com/contractcops/AuditingRoodMap [Solidity]
- https://github.com/0xcacti/awesome-solity-dev-tools [solidity]
- https://github.com/0xardant/solity-exercises [固體練習]
- https://github.com/mattstam/solity-template [Solidity模板]
- https://github.com/chinmay-farkya/solities-notes [固體說明]
- https://github.com/33357/smartcontract-apps [Solidity CN]
- https://github.com/nullity00/web3-resources [Web3 Resources]
- https://github.com/joranhonig/awesome-web3-ai-security [Web3 AI安全]
- https://github.com/immunefi-team/web3-security-library [Web3安全和編程教程/工具]
- https://github.com/malinariy/solities-gas-optimization-tips [氣體優化提示]
- https://github.com/w3f/grants-program [Web3 Foundation Grants計劃]
- https://github.com/bonfida/solana-name-service-guide [solana name服務]
- https://github.com/smartcontractkit/starter-kits [跨智能合同生態系統]
- https://github.com/smartcontractkit/solana-starter-kit [用於在solana上使用鍊鍊接的示例代碼]
- https://www.solanaecosystem.com [solana生態系統發現者]
- https://github.com/solana-developers/create-solana-dapp [CLI用於創建solana dapps]
- https://github.com/ithacaxyz/odyssey-examples [Odyssey的功能]
- https://github.com/openzeppelin/merkle-tree [默克爾樹]
- 智能合同精確處理最佳實踐[精確處理]
- https://github.com/gmh5225/layer2-architecture [layer2架構]
- https://github.com/gmh5225/optimism-vm-Architecture [樂觀主義VM架構]
- https://github.com/gmh5225/zkvm-Architecture [ZKVM架構]
遊戲
- https://github.com/aakarkun/unity-web3-skyrim-market [web3天際市場 - 統一]
- https://github.com/0xfableorg/0xfable [交易卡遊戲]
- https://github.com/adrianhajdin/project_web3_battle_game [Web3 NFT卡遊戲]
- https://github.com/ekaterinagorbunova/web3_nft_card_battle_game [web3 nft卡遊戲]
- https://github.com/moralisweb3/unity-web3-game-kit [Unity web3遊戲套件]
- https://github.com/web3gamesofficial/web3games-blockchain [基於基板的Web3games區塊鍊網絡]
- https://github.com/alto-io/game3.js [Web 3.0遊戲框架]
- https://github.com/proofofplay/piratenation-contracts [海盜國家遊戲]
- https://github.com/metamask/red-balloon-game [紅色氣球]
- https://github.com/apac-chainchanger/memesphinx [Meme Coin Coin Riddles遊戲在流鏈上]
錢包連接
- https://github.com/reown-com/appkit [web]
- https://github.com/rainbow-me/rainbowkit [web]
智能合約模板
- https://github.com/mattstam/solity-template [Solidity模板]
- https://github.com/gmh5225/foundry-template [Foundry Template]
- https://github.com/risc0/risc0-foundry-template [用於集成RISC零的鑄造模板]
SDK
- https://github.com/ankr-network/game-unreal-sdk [Mirage Unreal SDK]
- https://github.com/magicblock-labs/solana.unity-sdk [Unity-Solana SDK]
- https://github.com/virus-axel/godot-solana-sdk [Godot Solana SDK]
- https://github.com/hyperledger/web3j [輕量級Java和Android庫,用於與以太坊客戶集成]
- https://github.com/gmh5225/uupsproxyfactorysdk [upsproxyfactory的SDK]
- https://github.com/gmh5225/permit2-light-sdk [uniswap-permit2的Light SDK]
- https://github.com/gmh5225/multicall3-sdk [sdk of multicall3]
相互作用
- https://github.com/ethereum/go-Ethereum [Go Ethereum]
- https://github.com/ethereum/web3.py [py以太坊]
- https://github.com/wevm/viem [js/ts以太坊]
- https://github.com/web3/web3.js [JS以太坊]
- https://github.com/ethers-io/ethers.js [JS以太坊]
- https://github.com/mhw0/libethc [C以太坊]
- https://github.com/sk1122/solana-sdk [JS Solana]
工具
- https://github.com/swiss-knife-xyz/swiss-knife [您的所有EVM工具都在一個地方]
- https://github.com/a16z/halmos [EVM的符號測試工具]
- https://github.com/fukaoi/smart-token-took [sl sl spl spl spl spl of solana on solana上的工具]
- https://github.com/cryptoloutre/solana-tools [一堆工具來幫助Solana生態系統中的人們
- https://github.com/costa-group/ethir [用於以太坊bytecode的高級分析的框架]
- https://github.com/warp-id/solana-trading-bot [Solana Trading Bot]
- https://github.com/0xkoda/llevm [使用webllm與EVM字節交談]
- https://github.com/cdump/evmole [提取功能選擇器,EVM字節碼中的參數和狀態可變性]
- https://openchain.xyz/tools/abi [一些用於編碼/解碼ABI數據的方便工具]
- https://github.com/polymarket/Agents [使用AI代理在PolyMarket上自動交易]
- https://github.com/daijro/camoufox [anti-detect瀏覽器]
編譯器
- https://github.com/ethereum/somity [solidity]
- https://github.com/vyperlang/vyper [EVM的Pythonic智能合同語言]
- https://github.com/paradigmxyz/solar [固體編譯器,用鏽蝕寫]
- https://github.com/solana-developers/seahorse [在Python中寫下錨兼容索拉納程序]
開發框架
- https://github.com/foundry-rs/foundry [以太坊應用程序開發]
- https://github.com/coral-xyz/anchor [solana sealevel框架]
- https://github.com/anza-xyz/platform-tools [定制的Rust/clang工具鏈用於Solana Platform]
ZK證明
- https://github.com/matter-labs/awesome-zero-knowledge-Profords [ZKP指南]
- https://github.com/scipr-lab/libsnark [C ++庫的ZKSNARKS]
- https://github.com/consensys/gnark [快速ZK-SNARK庫]
- https://github.com/zkcrypto/bellman [zk-snark庫]
單位測試
- https://github.com/foundry-rs/foundry
- https://github.com/gmh5225/foundry-template [Foundry Template]
- https://github.com/risc0/risc0-foundry-template [用於集成RISC零的鑄造模板]
- https://github.com/gmh5225/forge-gui [for foundry模板的GUI包裝器命令行工具]
- https://github.com/nomicfoundation/hardhat
- https://github.com/zeroknots/brokentoken [Foundry測試套件以測試怪異的ERC20行為]
- https://github.com/sunweb3sec/defilabs [使用Foundry的鏈測試Defi]
安全
- https://github.com/crytic/awesome-ethereum-security [很棒的以太坊安全]
- https://github.com/sigp/solity-security-blog [Solidity Security]
- https://github.com/openzeppelin/openzeppelin-contracts [Openzeppelin合同是安全智能合同開發的圖書館]
- https://github.com/preslavxyz/web3-security-researcher-roadmap [Web3安全研究人員路線圖]
- https://github.com/tpiliposian/not-awesome-web3-security-roadmap [Web3安全研究人員路線圖]
- https://github.com/sunweb3sec [讓我們使Web3更安全]
- https://github.com/theredguild/damn-vulnerable-defi [開發人員,安全研究人員和教育工作者的智能合同安全培訓場]
- https://github.com/m14r41/pentestingerverything/tree/main/blockchain%20pentesting [pentesting清單]
- https://github.com/immunefi-team/web3-security-library [Web3安全和編程教程/工具]
- https://github.com/coinspect/wallet-security-verification-standard [錢包安全驗證標準]
- https://github.com/zhangzhuosjtu/web3bugs [智能合約中的錯誤]
- https://github.com/kadenzipfel/smart-contract-vulnerabilities [智能合同漏洞的集合]
- https://github.com/cryptostaker2/blockchain-security-audits [安全審核]
- https://github.com/obheda12/solities-security-compendium [solidity vuln]
- https://github.com/0xsanny/solsec [solana智能合約安全]
- https://github.com/crytic [Blockchain Security,@trailofbits]
- https://github.com/quillhash/solity-attack-vectors [Solidity SmartContract攻擊向量]
- https://github.com/crytic/building-secure-cartracts [指南和培訓材料以編寫安全的智能合約]
- https://github.com/crytic/etheno [以太坊安全分析和測試]
- https://github.com/crytic/echidna [以太坊智能合約fuzzer]
- https://github.com/trailofbits/manticore [以太坊智能合約fuzzer]
- https://github.com/fuzzland/ityfuzz [以太坊智能合約fuzzer]
- https://github.com/secureum/defi-security-summit-stanford [defi focus智能合約安全捕獲標誌]
- https://github.com/go-outside-labs/blockchain-hacking [hacking]
- https://github.com/decurity/abi-decompiler [恢復EVM智能合約的ABI]
- https://github.com/pcaversaccio/reentrancy-Attacks [重新入侵的歷史集合]
- https://github.com/crytic/slither [靜態分析儀]
- https://mythx.io [靜態分析儀]
- https://github.com/consensys/mythril [靜態分析儀]
- https://github.com/picodes/4naly3er [靜態分析儀]
- https://github.com/quillhash/quillaudit_auditor_roadmap [成為智能合同審核員]
- https://github.com/d-xo/weird-erc20 [怪異ERC20]
- https://github.com/slowmist/solana-smart-coltarts-ncrontract-security-best-practices [solana Security]
- https://github.com/joranhonig/awesome-web3-ai-security [Web3 AI安全]
- https://github.com/costa-group/ethir [用於以太坊bytecode的高級分析的框架]
- https://github.com/zeroknots/brokentoken [Foundry測試套件以測試怪異的ERC20行為]
- https://github.com/sunweb3sec/defilabs [使用Foundry的鏈測試Defi]
- https://github.com/cyfrin/audit-report-templating [如何生成PDF審核報告]
合同源代碼
- https://github.com/tangtj/bsc-contract-database [bsc]
- https://github.com/smartcontractkit/smart-contract-examples [erc]
- https://github.com/thirdweb-dev/contracts [erc]
- https://github.com/proofofplay/piratenation-contracts [海盜國家遊戲]
- https://github.com/tornadocash [龍捲風現金]
- https://github.com/nkrishang/tornado-cash-rebuilt [龍捲風現金重建]
- https://github.com/luvnft/memecoin-base [meme]
- https://github.com/itexpert0228/meme_project [meme]
DirectX
指導
- https://github.com/planetchili/hw3d [C ++ 3D DirectX教程]
- https://github.com/jpvanoosten/learningdirectx12 [dx12]
- https://github.com/paminerva/learndirectx [dx12]
- https://github.com/mkxjun/directx11-with-windows-sdk [dx11 Zh]
- https://github.com/d3dcoder/d3d12book [dx12]
- https://github.com/pkurth/d3d12renderer [dx12]
鉤
- https://github.com/rdbo/dx11-basehook [dx11 imgui]
- https://github.com/drnseven/d3d12-hook-imgui [dx12 imgui]
- https://github.com/niemand-sec/directx11hook [dx11 imgui]
- https://github.com/guided-hacking/gh_d3d11_hook [dx11]
- https://github.com/gogo9211/discord-overlay-hook [dx11]
- https://github.com/ocornut/imgui/commit/923BD2FD217C1DC1E75FA92B0284D3817904988B [DX11/12 resizeBuffers]
- https://github.com/marlkiller/d3dhook_imgui [D3D OpenGL Hook Imgui X86/X64]
- D3D9-D3D12,OpenGL和基於Vulkan的遊戲的通用圖形鉤
- https://github.com/jmpews/dobby [輕量級,多平台,多架式掛鉤框架]
- https://github.com/sh0ckfr/universal-dear-imgui-hook [通用的親愛的Imgui Hook]
- https://github.com/bruhmoment21/universalhookx [dx/opengl/vulkan]
工具
- https://github.com/visotw/3d9 [固定DX11遊戲中的骨鏡損壞]
仿真
- https://github.com/code-tom-code/software_d3d9 [dx9]
相容性
- https://github.com/cncnet/cnc-ddraw [舊遊戲]
- https://github.com/microsoft/d3d9on12 [direct3d9-on-12映射層]
覆蓋
- https://github.com/seanpesce/direct3d9-overlay
OpenGL
指導
- https://github.com/joeydevries/learnopengl
來源
- https://github.com/brackeen/glfm [在C/C ++中寫OpenGL ES代碼]
鉤
- https://github.com/bruhmoment21/universalhookx
VULKAN
指導
- https://github.com/googlesamples/android-vulkan-tutorials
API
- https://github.com/liblava/liblava [Vulkan的現代且易於使用的庫]
- https://github.com/corporateshark/lightweightvk
鉤
- https://github.com/rebzzel/kiero [x86/64 Windows]
- https://github.com/bruhmoment21/universalhookx [x86/64 Windows]
- https://github.com/drnseven/vulkan-hook [x86/64 Windows]
- https://github.com/sh0ckfr/universal-dear-imgui-hook
- https://github.com/halen84/imguirdr2hook
欺騙
指導
- https://github.com/dsasmblr/game-hacking
- https://github.com/dsasmblr/hacking-online-games
- https://github.com/kovidomi/game-reversing
- https://github.com/thezong/game-hacking
- https://github.com/mytechnotalent/reverse-weathering
- https://github.com/wtsxdev/reverse-weathering
- https://github.com/mytechnotalent/hacking-windows
- https://github.com/kotae4/introto-to-genhacking
- https://blog.can.ac/author/can1357
- https://github.com/sinakarvandi/hypervisor-from-scratch [Hypervisor]
- https://secret.club
- https://back..endineering
- https://vollragm.github.io
- https://www.triplefault.io
- https://advancedVectorxensions.github.io
- https://bright.engineer
- https://reversing.info
- https://www.unknowncheats.me
- https://forum.ragezone.com
- https://guidedhacking.com
- https://github.com/guided-hacking
- https://gamehacking.academy
- https://github.com/gamehackingacademy
- https://areweanticheatyet.com [使用反陳詞的遊戲列表]
- https://github.com/aclist/aclist.github.io [抗欺騙兼容列表]
- https://github.com/imadr/unity-gashacking [unity]
- https://vollragm.github.io/posts/unity-reversing [unity]
- https://wiki.cheatengine.org/index.php?title=mono [ce mono]
- https://github.com/krampus-nuggets/ce-tutorial [CE]
- https://il2cppdumper.com [IL2CPP]
- https://www.unknowncheats.me/forum/unity/465283-il2cppruntimedumper.html [il2cpp]
- https://github.com/shalzuth/nativenetssharp [注入C#代碼]
- https://github.com/januwa/game-verversed-study [CE Guide ZH]
- https://github.com/csgohacks/master-guide [CSGO指南]
- 不同的通道鉤[鉤指南]
- http://pwnadventure.com [可駭客遊戲]
- https://github.com/gamecrashproject/ue4-hacking-guideline [breal]
- https://github.com/timmisiak/windbgcookbook [windbg]
- https://github.com/anhkgg/awesome-windbg-extensions [windbg]
- 未發現的作弊引擎
- 有關遠程Windows內核調試的指南
- https://github.com/rmusser01/infosec_reference/blob/master/draft/games.md [game hacking]
- https://github.com/cragson/osmium [C ++外部作弊框架]
- https://github.com/wangxuan95/xilinx-fpga-pcie-xdma-tutorial [dma Tutorial]
- https://github.com/netkingj/awesome-android-security [android(samsung)安全研究參考]
- https://github.com/gregkh/kernel-development [linux內核開發]
- https://github.com/arandomperson7/appsealing-verversal [逆轉和旁路用於應用程序]
- https://klecko.github.io/posts/selinux-bypasses [bypass selinux]
- https://github.com/solaree/pairipcore [Google的Android應用程序公共研究]
- https://github.com/enjoy-digital/litepcie [小足跡和可配置的PCIE核心]
偵錯
- https://github.com/stars/gmh5225/lists/debugger [list]
- https://github.com/cheat-engine/cheat-engine
- https://github.com/sinakarvandi/hypervisor-from-scratch [Hypervisor]
- https://github.com/jasongoemaat/cheatenginemonhehelper [CE Mono Helper]
- https://github.com/doranekosystems/frida-ceserver [iOS的CE服務器]
- https://github.com/doranekosystems/ceserver-ios [移植ceserver to ios.dynamic Analysis]
- https://github.com/gmh5225/cheat-engine-ceserver-pcileech [for Pcileech的CE服務器]
- https://github.com/user23333/veh [ManualMap Veh DLL的CE插件]
- https://github.com/x64dbg/x64dbg
- https://github.com/marakew/syser
- https://github.com/noword/gdb-windows-binaries [gdb]
- https://github.com/ajkhoury/reclassex
- https://github.com/reclassnet/reclass.net
- https://github.com/niemand-sec/reclass.net-driverreader [reclass driverreader]
- https://github.com/beneliccode/kreclassex [kernel reclassex]
- https://github.com/imerzan/reclass-dma [reclass dma]
- https://github.com/metick/cheatengine-dma [備忘錄DMA]
- https://github.com/kaijia2022/cheat-engine-dma-plugin [seatengine dma]
- https://github.com/x64dbg/dotx64dbg
- https://github.com/imugee/xdv
- https://github.com/eteran/edb-debugger [for Linux]
- https://github.com/korcankaraokcu/pince [for Linux]
- https://github.com/mrexodia/titanhide
- https://github.com/air14/hyperhide
- https://github.com/hyperdbg/hyperdbg
- https://github.com/3526779568/vt-debuger
- https://github.com/teemu-l/execution-trace-viewer
- https://github.com/changeofpace/force-page-protection [繞過重新映射內存]
- https://github.com/icsharpcode/ilspy [for Unity]
- https://github.com/dnspy/dnspy [for Unity]
- https://github.com/holly-hacker/dnspy.extension.holly [for Unity]
- https://github.com/mandiant/dncil [for Unity]
- https://github.com/hugsy/cfb [Monitor IRP]
- https://github.com/kharos102/ioctldump [Monitor irp]
- https://ioninja.com/downloads.html [協議分析儀]
- https://github.com/wilszdev/steamantiantIdeBug [Steam]
- https://github.com/h5gg/h5gg [ios作弊引擎]
- https://github.com/ri-char/pwatch [linux/android上的HWBP]
- https://github.com/enenh/pwatch-c [linux/android上的HWBP]
- https://github.com/ylarod/hardware-breakpoint [linux/android上的HWBP]
數據包嗅探器和過濾器
- https://github.com/wpo-foundation/win-shaper
- https://github.com/wiresock/ndisapi
- https://github.com/akebi-group/akebi-packetsniffer
- https://github.com/basil00/divert [packet devert]
- https://github.com/fksvs/inject
- https://github.com/hercul3s/packet-sniffer [packet logger/decryptor]
數據包捕獲和解析
- https://github.com/seladb/pcapplusplus [pcap]
- https://github.com/nmap/npcap
Speedhack
- https://github.com/absoiute/speedhack
- https://github.com/letomaniy/speed-hack
- https://github.com/iamsanjid/ce_speed_hack
重新工具
- https://dogbolt.org
- https://github.com/msd0pe-1/cve-maker [查找CVE和Exploits的工具]
- https://github.com/mentebinaria/retoolkit [反向工程師的工具包]
- https://github.com/stevemk14ebr/retools
- https://github.com/batabo/acepatcher [.net Patcher]
- https://github.com/waryas/kace [模擬ring3中的驅動器,帶有自上下文映射或獨角獸]
- https://github.com/vollragm/ptview [Windows上的瀏覽頁面表]
- https://github.com/ibotpeaches/apktool [apk]
- https://github.com/user1342/obfu-de-cate [apk]
- https://github.com/genymobile/scrcpy [顯示和控制您的Android設備]
- https://github.com/barry-ran/qtscrcpy [顯示和控制您的Android設備]
- https://github.com/guided-hacking/gh-offset-dumper [掃描和netvars並丟棄其相對偏移]
- https://github.com/guided-hacking/gh-entity-list-finder [掃描遊戲過程中最有可能的實體列表地址]
- https://github.com/rednaga/apkid [peid for android]
- https://github.com/col-e/recaf [java]
- https://github.com/tomvita/se-tools [Nintendo Switch]
- https://github.com/studentblake/xci-explorer [XCI Explorer]
- https://github.com/Anonym0ose/jitdumper [CIL方法笨拙]
- https://github.com/cfig/android_boot_image_editor [用於反向工程的工具Android ROM圖像]
- https://github.com/hasherezade/pe-bear [PE查看器]
- https://github.com/zodiacon/totalpe2 [PE查看器]
- https://github.com/apklab/apklab [android reverse-deangeering工作台vs代碼]
- https://github.com/evild3ad/memprocfs-analyzer [Windows Forensic Analysis]
- https://github.com/eybisi/kavanoz [靜態解放常見的Android銀行惡意軟件]
- https://github.com/cyberark/pipeviewer [顯示有關Windows中命名管的詳細信息]
- https://github.com/cursey/regenny [重建結構並生成標頭文件]
- https://github.com/zodiacon/etwexplorer [查看ETW提供商清單]
- https://github.com/doranekosystems/ceserver-ios [移植ceserver to ios.dynamic Analysis]
- https://github.com/voidsec/ioctlpus [用於與任意輸入的Deviceiocontrol請求]
- https://github.com/horsicq/nauz-file-detector [linker/Compiler/tool detter]
- https://github.com/gcarmix/hexwalk [hex viewer/editor/Analyzer]
- https://github.com/romanrybachek/ioctl_helper [用於將IOCTL發送到Windows驅動程序的GUI工具]
- https://github.com/sevaa/dwex [dwarf Explorer]
- https://github.com/katahiromz/risoheditor [win32資源編輯器]
- https://github.com/fadi002/de4py [python反向工程的工具包]
- https://github.com/skelsec/minidump [python庫來解析並閱讀Microsoft Minidump文件格式]
- https://github.com/zodiacon/quickasm [x86/x86彙編器和仿真器]
- https://github.com/skylot/jadx [dex to java demompiler]
- https://github.com/google/android-classyshark [android和java bytecode查看器]
- https://github.com/marin-m/vmlinux-to-elf [vmlinux to elf]
- https://github.com/emlinhax/dbgviewex [登錄ETW事件和系統調試日誌的工具]
- https://github.com/amosshi/binaryinternals [查看二進製文件的內部]
- https://github.com/werwolv/imhex [反向工程師的十六進制編輯]
- https://github.com/microsoft/pdblister [
symchk /om
的更快版本用於生成pdb清單] - https://github.com/yaxinsn/vermagic [更改Linux內核模塊的vermagic和CRC]
- https://github.com/rhboot/pesign [用於簽名的pe-coff二進製文件的Linux工具]
- https://github.com/sv-foster/unsign [從PE/COFF可執行文件中刪除所有數字簽名]
- https://github.com/colinsenner/pecleaner [X86/X64二進製文件的所有有錢標頭信息]
- https://github.com/kouzhudong/antihook [枚舉並刪除Windows中的鉤子]
- https://github.com/jixiaoyong/apksigner [android apk符號工具]
- https://github.com/4d61726b/virtualkd-redux [VirtualKd的複興和現代化]
- https://github.com/ax/apk.sh [一個使反向工程Android應用程序更容易的bash腳本]
- https://github.com/vm03/payload_dumper [android OTA有效載荷dumper]
- https://github.com/ssut/payload-dumper-go [android ota有效載荷dumper]
- https://github.com/mlgmxyysd/xiaomi-hyperos-bootloader-bypass [Xiaomi hyperos bootloader旁路]
- https://github.com/null-luo/btrace [android應用程序動態行為跟踪工具使用EBPF]
- https://github.com/michaelmsonne/signtoolgui [signtool gui]
- https://disasm.pro/ [實時彙編器/拆卸器]
- https://github.com/iofomo/abyss [android系統呼叫鉤]
- https://github.com/uuksu/rpgmakerdecrypter [用於提取RPG Maker XP,VX和VX ACE加密檔案的工具]
- https://github.com/gmh5225/compiler-binary-richprint [印刷編譯器信息存儲在PE可執行文件的富標題中]
- https://github.com/mandiant/goresym [GO符號恢復工具]
混合的布爾值
- https://github.com/colton1skees/mba-Resources [混合佈爾 - 弧資源列表]
修復VMP
- https://github.com/obfuscator-collections/vmprotect
- https://github.com/wallds/novmpy
- https://github.com/gmh5225/vmp-vmp3_64bit_disasm-prerease-
- https://github.com/gmh5225/vmp3_utils
- https://github.com/archercreat/titan
- https://github.com/nac-l/mergen
- https://github.com/fjqisba/vmphelper
- https://github.com/xtremegamer1/vmdevirt-vil
修復themida
- https://github.com/sodareverse/tde
- https://github.com/ergrelet/themida-unmutate
修復OLLVM
- https://bbs.pediy.com/thread-272414.htm
- https://github.com/obpo-project/obpo-plugin
動態二元儀器
- https://github.com/hzqst/unicorn_pe
- https://github.com/momo5502/emulator [Windows用戶空間模擬器]
- https://github.com/nitr0-g/pevisor [pe]
- https://github.com/googleprojectzero/tinyinst
- https://github.com/revsic/cpp-veh-dbi
- https://github.com/zehmatt/covcane
- https://github.com/bitdefender/river
- https://github.com/beehive-lab/mambo [amm]
- https://github.com/dynamorio/drmemory
- https://github.com/aroxby/dynre-x86
- https://github.com/waterloobridge/adbi [for android]
- https://github.com/crmulliner/adbi [for android]
發射器濫用者
- https://github.com/ricardonacif/launcher-abuser
旁路補丁
- https://github.com/armasm/easyantipatchguard
- https://github.com/9176324/shark
- https://github.com/gmh5225/patchguard-2023 [鯊魚]
- https://github.com/hfiref0x/upgdsed [file]
- https://github.com/mattiwatti/efiguard [efi]
- https://github.com/zzhouhe/pg1903 [demo nx]
- https://gist.github.com/gmh5225/0A0C8E3A2D718E2D6F9B6A07D5E0F80A [PG CTX]
- https://github.com/gmh5225/quickpgtrigger [壓力測試]
- https://github.com/tandasat/sushi [監視PG]
- https://github.com/gmh5225/disabling-hyper-v [disable hyper-v]
- https://github.com/adamoron/patchguardbypass
- https://github.com/zer0condition/demystifying-patchguard
- https://github.com/4l3x777/dse_pg_bypass [dse&pg bypass通過byovd攻擊]
- https://github.com/i32-sudo/vulnerablepatchguardexploit
- https://github.com/emlinhax/tableflipper [部分禁用PatchGuard至Win11 21H2]
駕駛員簽名執行
- https://github.com/gmh5225/dse_hook
- https://github.com/gmh5225/dse-patcher-2
- https://github.com/gmh5225/disabledse
Windows內核資源管理器
- https://github.com/nullarray/winkernel-resources [指南]
- https://github.com/supermanc88/document/tree/master/windows%20driver%20Development [Guide]
- https://windiff.vercel.app [fiff]
- https://github.com/gmh5225/ntoskrnl_file_collection [ntoskrnl文件的各種版本]
- https://github.com/gmh5225/win32k_file_collection [win32k文件的各種版本]
- https://github.com/gmh5225/win32k_file_collection2 [win32k文件的各種版本]
- https://github.com/jiubanlo/winnt5_src_20201004 [洩漏的Windows XP源]
- https://github.com/blackint3/openark [工具]
- https://github.com/beneliccode/winark [工具]
- https://github.com/hfiref0x/kdu [內核驅動程序工具]
- https://github.com/jthuraisamy/telemetrysourcerer [枚舉和禁用回調/etw]
- https://github.com/progmboy/openprocmon [開源過程監視器]
- https://github.com/winsiderss/systeminformer [原始名稱是“ Process Hacker”]
- https://github.com/0xcpu/executivecallbackobjects [callback]
- https://github.com/0xcpu/winaltsyscallhandler [altsystemcallhandlers]
- https://github.com/downwithup/callmon [altsystemcallhandlers]
- https://github.com/everdox/infinityhook [etw Hook]
- https://github.com/ayinsama/anti-antidebuggerdriver [etw Hook]
- https://github.com/gmh5225/acdrv [etw Hook]
- https://github.com/fiyher/infinityhookpro [etw Hook ex]
- https://github.com/gmh5225/etwhook-infinityhookclass [etw hook ex]
- https://github.com/dearxiaogui/infinityhookpro-main [etw Hook win11]
- https://github.com/thomasonzhao/infinityhookpromax [etw Hook win11]
- https://github.com/oxygen1a1/infinityhook_latest [etw Hook Win11]
- https://github.com/gmh5225/pdf-pmc-x86 [x86-架構中的PMI研究]
- https://github.com/kelvinmsft/threadspy [pmi callback]
- https://github.com/kelvinmsft/perfmon [PMI回調]
- https://github.com/gmh5225/pmi-hpc [pmi]
- https://github.com/marcusbotacin/branchmonitoringproject [pmi]
- https://github.com/gmh5225/nmi-enumnmicallback [枚舉NMI]
- https://github.com/gmh5225/disable-nmi-callbacks [disable nmi]
- https://github.com/gmh5225/nmi-nmi_callback [觸發NMI]
- https://github.com/gmh5225/kernel_anti-cheat [nmi]
- https://github.com/jlgreathouse/amd_ibs_toolkit [amd採樣]
- https://github.com/intelpt/windowsintelpt [intel pt]
- https://github.com/cristinacu/ingsoc [intel pt]
- https://github.com/dprovinciani/pt-detector [intel pt]
- https://github.com/googleprojectzero/winafl [intel pt fuzzer]
- https://github.com/intelpt/winipt [ipt.sys]
- https://github.com/australeo/libipt-rs [ipt.sys]
- https://github.com/intelpt/processor-trace [intel pt解碼器]
- https://github.com/gmh5225/driver-intel-pebs-loophpcs [intel pebs]
- https://github.com/libiht/libiht [英特爾硬件跟踪庫]
- https://github.com/ilovecsad/ark [工具]
- https://github.com/gmh5225/ntoskrnl_file_collection [ntoskrnl版本]
- https://github.com/gmh5225/win32k_file_collection [win32k版本]
- https://github.com/gmh5225/win32k_file_collection2 [win32k版本]
- https://github.com/gmh5225/mssymbolscollection [內核符號]
- https://github.com/am0nsec/wkpe [枚舉VAD]
- https://github.com/armvirus/driverdllfinder [查找驅動程序無用的內存]
- https://github.com/mahmoudzohdy/apicallproxy [Windows api call obfuscation]
- https://github.com/spuckwaffel/simple-mmcopymory-hook [hook mmcopymemory]
- https://github.com/vollragm/ptview [Windows上的瀏覽頁面表]
- https://github.com/misc0110/pteditor [pt編輯器]
- https://github.com/cey-999/ntoskrnl_viewer [ntoskrnl viewer]
- https://github.com/ekknod/nmi [阻止NMI中斷]
- https://github.com/equifox/ksdumper [使用內核空間的傾銷過程]
- https://github.com/mastercodeon314/ksdumper-11 [經典和傳奇ksdumper]
- https://github.com/not-matthias/nemesis [使用內核空間的傾銷過程]
- https://github.com/allogic/kdbg [工具]
- https://github.com/backengineering/voyager [Windows 10 x64的Hyper-V黑客框架(AMD&Intel)]
- https://github.com/gmh5225/voyager [Windows 10 x64的Hyper-V黑客入侵框架(AMD&Intel)]
- https://github.com/nurdalert/modded-voyager
- https://github.com/gmh5225/fortnite-voyagertf [fortnite for fortnite]
- https://github.com/repnz/apc-research [APC內部研究法規]
- https://github.com/intel/pcm [處理器計數器顯示]
- https://github.com/chengchengcc/ark-tools [一些內核研究]
- https://github.com/alal4465/kernelmon [監視Windows內核驅動程序]
- https://github.com/gmh5225/practical-reverse-wearkineering-solutions [dpc+apc]
- https://github.com/br-sn/cheekyblinder [使用簽名的弱勢驅動程序枚舉和刪除內核回調]
- https://github.com/getrektboy724/dcmb [刪除內核回調]
- https://github.com/air14/kdbgdecryptor [一個簡單的示例如何解密內核調試器數據塊]
- https://github.com/faeryice/memscanner [內存掃描儀]
- https://github.com/irql/nokd [內核調試協議]
馬格斯克
- https://github.com/pshocker/zygisk-magiskhide
- https://github.com/longpoxin/hideroot
- https://github.com/canyie/riru-momohider
- https://github.com/newbit1/rootavd [root avd]
- https://github.com/fox2code/foxmagiskmodemanager [Magisk的模塊管理器]
- https://github.com/dr-tsng/zygiskonkernelsu [inkernelsu on zygisk]
- https://github.com/svoboda18/magiskboot [引導圖像修改工具]
- https://github.com/xiaoxindada/magiskboot_ndk_on_linux [啟動圖像修改工具]
- https://github.com/okiineko/magiskboot_build [啟動圖像修改工具]
- https://github.com/gmh5225/magiskboot-linux [使用github操作來構建magiskboot]
- https://github.com/the-dise/asypixel [Magisk模塊在Google Pixel下偽裝設備]
- https://github.com/gmh5225/magiskhide [Portable Magiskhide]
- https://github.com/lico-n/zygiskfrida [使用Zygisk注入Frida小工具]
- https://github.com/admirepowered/zygisk_mod [獨立實現zygisk]
- https://github.com/anasfanani/magisk-tailscaled [用於運行尾部的Magisk模塊]
- https://github.com/j-hc/flagsecurepatcher [禁用標誌安全和屏幕截圖聽眾]
- https://github.com/hackcatml/zygisk-memdump [zygisk模塊,從過程內存中轉儲如此文件]
芙烈達
- https://github.com/hackcatml/frida-watchpoint-tutorial [Frida的SethardwareWatchPoint教程]
- https://github.com/crackercat/strongr-frida-android
- https://github.com/gmh5225/frida-ue4dump [ue4]
- https://github.com/jcalabres/hook-updater [自動更新frida鉤]
- https://github.com/gmh5225/frida-boot [與弗里達(Frida)一起二進制儀器研討會,用於初學者]
- https://github.com/smartdone/frida-scripts [一些腳本]
- https://github.com/0xdea/frida-scripts [某些腳本]
- https://github.com/seeeflowerx/frida-smali-trace [smali trace]
- https://github.com/ylarod/florida [frida-server的反探測版]
- https://github.com/noobpk/frida-android-hook [跟踪class/functions/並修改返回值]
- https://github.com/apkunpacker/antifrida_bypass [繞過一些抗fifrida檢查]
- https://github.com/abbbbbi/frida-seccomp [frida-seccomp]
- https://github.com/rednaga/frida-stack [在Frida中獲得更好的堆棧和回溯]
- https://github.com/doranekosystems/frida-findoutwhataccess [找出訪問此地址的訪問]
- https://github.com/piotrbania/frida_usb_dump [frida腳本,允許在macOS上嗅聞和傾倒USB流量]
- https://github.com/hackcatml/frida-findjninativemethods [應用程序運行時查找JNI本機方法]
鉤藝術(Android)
- https://github.com/pagalaxylab/yahfa
- https://github.com/canyie/pine
鉤Syscall(Android)
- https://github.com/iofomo/abyss [android系統呼叫鉤]
Android終端模擬器
- https://github.com/termux/termux-app
- https://github.com/sylirre/neotty
- https://github.com/jackpal/android-terminal-emulator
- https://github.com/neoterrm/neoterm
Android文件資源管理器
- https://github.com/nzcv/note [guide-zh]
- https://github.com/ibotpeaches/apktool
- https://github.com/pxb1988/dex2jar
- https://github.com/skylot/jadx [dex to java demompiler]
- https://github.com/luckypray/dexkit-android [dex deobfuscator]
- https://github.com/lsposed/dexbuilder [C ++生成DEX文件]
- https://github.com/rednaga/apkid [peid for android]
- https://github.com/apklab/apklab [android reverse-deangeering工作台vs代碼]
- https://github.com/pgp/xfiles [for(rooted)android]
- https://github.com/gmh5225/adbfilemanager [使用ADB協議的文件管理器]
- https://github.com/muntashirakon/appmanager [完整的軟件包經理和查看器]
- https://github.com/pgp/xfiles [for(rooted)android]
- https://github.com/raival-e/file-explorer [Android文件Explorer]
Android Memory Explorer
- https://github.com/misc0110/pteditor [pt編輯器]
- https://github.com/joaomlneto/procmap
- https://github.com/kp7742/memdumper [dump]
- https://github.com/mrcang09/android-mem-edit
- https://github.com/exploittheloop/writemem
- https://github.com/abcz316/rwprocmem33 [Linux讀取和寫入過程內存模塊]
- https://github.com/ri-char/rwmem [fork版本的rwprocmem33]
- https://github.com/iaik/armageddon [武器上的緩存攻擊]
- https://github.com/tamirzb/cve-2021-1961 [CVE RW]
- https://github.com/mjx0/kittymemory [運行時代碼修補]
- https://github.com/gmh5225/kittymemory-ios [iOS的運行時代碼修補]
- https://github.com/vrolife/mypower [內存掃描儀]
- https://github.com/doranekosystems/memory_server [帶有REST API的內存掃描儀和分析儀]
- https://github.com/kuhakupixel/acethegame [遊戲黑客工具]
- https://github.com/gmh5225/android-memorytool [rpm]
- https://github.com/Anonym0uswork1221/c-android-memory-tool [rpm]
- https://github.com/poko-apps/memkernel [rpm]
- https://github.com/dena/mempatch [內存篡改工具]
- https://github.com/hackcatml/zygisk-memdump [zygisk模塊,從過程內存中轉儲如此文件]
Android應用CVE
- https://github.com/nahid0x1/cve-2024-0044 [影響Android版本12&13的漏洞]
Android內核CVE
- https://github.com/scottybauer/android_kernel_cve_pocs [list]
- https://github.com/tangsilian/android-vuln [list]
- https://github.com/jsirichai/cve-2019-2215 [for Pixel 2/XL]
- https://github.com/bluefrostsecurity/cve-2020-0041 [Pixel 3]
- https://github.com/j4nn/cve-2020-0041 [for Pixel 3]
- https://github.com/polygraphene/dirtypipe-android [for Pixel 6]
- https://github.com/tiann/dirtypiperoot [for Pixel 6]
- https://github.com/markakd/bad_io_uring [for Pixel 6]
- https://github.com/0x36/pixel_gpu_exploit [for pixel7/8 pro with android 14]
- https://soez.github.io/posts/cve-2022-22265-samsung-npu-driver [for samsung]
Android Bootloader旁路
- https://github.com/mlgmxyysd/xiaomi-hyperos-bootloader-bypass [Xiaomi hyperos bootloader旁路]
Android ROM
- https://xdaforums.com [指南]
- https://github.com/akipe/awesome-android-aosp [指南]
- https://github.com/musabcel/android_rom_list [list]
- https://github.com/vm03/payload_dumper [android OTA有效載荷dumper]
- https://developer.android.com/studio/run/win-usb [Google USB驅動程序]
- http://www.miui.com/unlock/download.html [for Xiaomi]
- https://miuiver.com/miflash [miflash]
- https://xiaomifirmwareupdater.com [小米固件更新]
- https://sourceforge.net/projects/recovery-for-xiaomi-devices/files [twrp for xiaomi]
- https://github.com/cfig/android_boot_image_editor [android rom工具]
- https://github.com/badabing2005/pixelflasher [android rom工具for Pixel]
- https://github.com/ctapchuk/android_bootable_recovery-offer-jrecrp [橙色恢復]
Android設備樹
- https://github.com/micode/kernel_devicetree [小米設備樹]
- https://github.com/cupid-development/ [小米設備樹]
- https://github.com/pixelos-aosp/official_devices [pixelos設備樹]
- https://github.com/ymdzq/ofrp-device_xiaomi_mondrian [for Redmi k60(mondrian)]
- https://github.com/flakeforever/device_xiaomi_mondrian [Pixel Experience Plus for Redmi K6/Poco F5 Pro]
Android內核來源
- https://source.android.com/docs/setup/build/building-kernels [docs]
- https://android.googlesource.com/kernel/manifest/++refs [清單]
- https://android.googlesource.com/kernel/manifest [清單]
- https://android.googlesource.com/kernel/common [gki]
- https://github.com/aosp-mirror/kernel_common [gki]
- https://github.com/pixelos-aosp/manifest [基於AOSP的ROM旨在提供最好的像素]
- https://www.android-x86.org [x86]
- https://blissos.org [x86]
- https://github.com/micode/xiaomi_kernel_opensource [xiaomi kernel]
- https://github.com/xiaomi-sm8450-kernel [Xiaomi kernel]
- https://github.com/danda420/kernel_xiaomi_sm8250 [poco f3/f4的小米內核]
- https://github.com/lowtension/android_kernel_xiaomi_sm8475 [Pixel Experience Plus for Redmi K6/Poco F5 Pro]
- https://github.com/grapheneos-archive/kernel_msm-coral [Pixel 4/4xl/4a]
- https://github.com/msnx/kernelsu-pixel4xl [kernelsu for Google pixel4xl]
- https://github.com/universal5433/android_kernel_samsung_universal5433 [三星15433]
- https://github.com/sm7325-ae/android_kernel_motorola_dubai [Moto Edge 30]
- https://github.com/mylove90/pc_ginkgo [with kernelsu with kernelsu]
- https://github.com/fiqri19102002/android_kernel_kernel_xiaomi_sweet [redmi Note 10 Pro]
- https://github.com/exwhyzed9/android_kernel_gki_gki_common_5.10 [redmi Note 11T Pro(+)/POCO X4 GT]
- https://github.com/psavarmattas/android_kernel_oneplus_sm7250-wksu [kernelsu for OnePlus]
- https://github.com/huawei-mediatek-devs/android_kernel_huawei_mt6761 [huawei mt6761]
- https://github.com/pascua28/android_kernel_samsung_sm7150 [samsung sm7150]
- https://github.com/devhunter1/a146b-kksu [kernelsu for samsung a14 5g(a14x)]
- https://github.com/utziacre/android_kernel_xiaomi_pipa [Xiaomi Pad 6 kernel]
- https://github.com/utziacre/android_kernel_oneplus_sm8250 [OnePlus 8/8t/8pro/(9r?)內核]
Android root
- https://github.com/topjohnwu/magisk
- https://github.com/tiann/kernelsu
- https://github.com/riarumoda/kernelsu-4.4 [適用於Linux內核4.4 + Google GCC 4.9]
- https://github.com/bmax121/apatch
- https://github.com/lzghzr/apatch_kpm [apatch模塊]
- https://github.com/abcz316/skroot-linuxkernelroot
- https://github.com/0x36/pixel_gpu_exploit
Android內核驅動器開發
- https://github.com/gmh5225/androiddrivesignity [旁路驅動程序簽名驗證在Android內核(ARMV8.3)]
- https://github.com/gmh5225/android-kernel-driver-template [a gki android內核驅動程序(aarch64)模板]
- https://github.com/dabao1955/kernel_build_action [自動構建內核的動作]
Android內核探索器
- https://docs.kernel.org [Linux內核文檔]
- https://armv8-ref.codingbelief.com/en [ARMV8-A的ARM架構參考手冊]
- https://github.com/yhnu/op7t [DIY內核]
- https://github.com/yabinc/simpleperf_demo [perf]
- https://github.com/gmh5225/android_ebpf [ebpf]
- https://github.com/pshocker/android_bpf_sys [ebpf]
- https://github.com/seeeflowerx/stackplz [ebpf]
- https://github.com/cloudfuzz/android-kernel-exploitation [android內核利用]
- https://github.com/snoopy-sec/localroot-all-cve [root cve]
- https://github.com/xmmword/dpatch [syscall dispatcher修補POC]
Android內核驅動程序
- https://github.com/rogxo/kernel_hack
- https://github.com/jiang-night/kernel_driver_hack
- https://github.com/weijilab/kernel-hook-framework [內線掛鉤框架]
- https://github.com/poko-apps/memkernel [rpm]
Android Network Explorer
- https://github.com/emanuele-f/pcapdroid
Android內存加載
- https://github.com/icculus/mojoelf
- https://github.com/lockedbyte/so_loader
iOS越獄
- https://github.com/kpwnz/def1nit3lyn0taja1lbr3aktool [ios 15.7和iOS 16.5]
- https://github.com/opa334/dopamine [ios 15和16]
- https://github.com/roothide/dopamine2-roothide [ios 15和16]
- https://github.com/jjolano/shadow
- https://github.com/gmh5225/ios-jailbreak-fugu15
- https://github.com/kc57/ihide
- https://github.com/palera1n/palera1n
- https://github.com/checkra1n
- https://github.com/opa334/trollstore [監獄應用程序]
- https://github.com/paradiseuo/ipapatch [無越獄的補丁iOS應用程序]
iOS內存資源管理器
- https://github.com/hackcatml/kfd-explorer [ios內核內存探索器]
虛擬環境
- https://github.com/fblackbox/blackbox [android]
- https://github.com/mandiant/flare-vm
- https://github.com/hzqst/vmwarehardenedloader
- https://github.com/d4rksystem/vmwarecloak
- https://github.com/utmapp/utm [在iOS上運行虛擬機]
分解器
- ida Pro
- 二進制忍者
- https://github.com/nationalsecurityagency/ghidra
- https://github.com/avast/retdec
- https://github.com/col-e/recaf [java]
- https://github.com/konloch/bytecode-viewer [java]
- https://github.com/java-deobfuscator/deobfuscator [java]
- https://github.com/angr/binsync [sync]
- https://github.com/crytic/ethersplay [evm dissAssembler]
IDA主題
- https://github.com/pr701/dp701 [ida pro的黑暗主題]
- https://github.com/seanwupi/ida-dark-plus [dark+主題]
- https://github.com/ioncodes/long_night
- https://github.com/can1357/idathemer
IDA插件
- https://github.com/vmallet/ida-plugins [IDA插件列表]
- https://github.com/onethawt/idaplugins-list [IDA插件列表]
- https://github.com/nyamisty/idasdk-collection/tree/master [ida sdk]
- https://github.com/zyantific/idaskins [Skins]
- https://github.com/endofunky/ida-nord-theme [Skins]
- https://github.com/giladreich/ida_migrator [遷移數據庫]
- https://github.com/can1357/ntrays [Windows內核增強]
- https://github.com/justasmasiulis/ida_bitfields [Windows內核增強]
- https://github.com/voidsec/driverbuddyreloaded [Windows內核分析]
- https://github.com/jhftss/ida2obj [Coff Relink]
- https://github.com/synacktiv/dotniet [導入.net符號]
- https://github.com/aliyunav/finger [通過雲識別功能]
- https://github.com/felixber/findfunc [通過模式識別函數]
- https://github.com/kweatherman/sigmakerex [簽名製造商]
- https://github.com/a200k/ida-pro-sigmaker [簽名製造商]
- https://github.com/mahmoudimus/ida-pysigmaker [簽名製造商]
- https://github.com/tkazer/ida-pro-9.0-sigmaker [IDA 9.0的簽名製造商插件]
- https://github.com/mixaill/fakepdb [iDa的PDB生成]
- https://github.com/illera88/ponce [符號執行]
- https://github.com/airbus-cert/ttdddbg [時間旅行調試]
- https://github.com/p4nda0s/lazyida [lazyida]
- https://github.com/quarkslab/qsynthesis [Greybox合成器適用於彙編指令的去量]
- https://github.com/medigateio/ida_medigate [rtti]
- https://github.com/oalabs/findyara-ida [yara]
- https://github.com/therealdreg/ide_vmware_windows_gdb [ida+vmware+gdb]
- https://github.com/therealdreg/ide_bochs_windows [ida+bochs]
- IDA和VS代碼的集成,該集成既可以連接,又可以輕鬆執行和調試IDAPYTHON腳本
- https://github.com/binarly-io/efixplorer [UEFI固件]
- https://github.com/accenture/protobuf-finder [protobuf]
- https://github.com/strazzere/golang_loader_assist [Go Rversed]
- https://github.com/gregorymorse/ghidradec [ghidra demompiler]
- https://github.com/antoineblaud/easyre [跟踪執行]
- https://github.com/flatz/IDA_PS5_ELF_PLUGIN [PS5 ELF LOADER]
- https://github.com/gaasedelen/tenet [執行跟踪]
- https://github.com/synacktiv/frinet [frida tracer]
- https://github.com/polymorf/findcrypt-yara [查找加密常數]
- https://github.com/anatolikalysch/vmattack [for ida pro]
- https://github.com/cseagle/sk3wldbg [Unicorn]
- https://github.com/RicBent/Classy [Manage classes]
- https://github.com/archercreat/ida_names [Renames pseudocode windows with the current function name]
- https://github.com/helpsystems/turbodiff [diff]
- https://github.com/joxeankoret/diaphora [diff]
- An IDAPython module for way more convienent way to Reverse Engineering iOS kernelcaches
- https://gitlab.com/eshard/d810 [Deobfuscate code at decompilation time by modifying IDA Pro microcode]
- https://github.com/CKCat/d810 [Deobfuscate code at decompilation time by modifying IDA Pro microcode]
- https://github.com/airbus-seclab/AutoResolv [Resolves functions imported from external libraries]
- https://github.com/snare/ida-efiutils [EFI binaries]
- https://github.com/JusticeRage/Gepetto [ChatGPT]
- https://github.com/MayerDaniel/ida_gpt [ChatGPT]
- https://github.com/mahaloz/DAILA [ChatGPT]
- https://github.com/ke0z/VulChatGPT [ChatGPT]
- https://github.com/WPeace-HcH/WPeChatGPT [ChatGPT]
- https://github.com/lzyddf/IDA_Plugin_PCodeGPT [ChatGPT]
- https://github.com/deadeert/EWS [Emulation]
- https://github.com/patois/genmc [Display Hex-Rays Microcode]
- https://github.com/RolfRolles/HexRaysDeob [Hex-Rays Microcode]
- https://github.com/HexRaysSA/goomba [Simplify MBA]
- https://github.com/es3n1n/ida-wakatime-py [WakaTime integration for IDA Pro]
- https://github.com/senator715/IDA-Fusion [Fast Signature scanner & creator]
- https://github.com/cellebrite-labs/PPLorer [Resolves PPL calls to the actual underlying PPL function]
- https://github.com/kweatherman/ida_missinglink [Fills in missing indirect CALL & JMP target information]
- https://github.com/yubie-re/ida-jm-xorstr-decrypt-plugin [Attempts to decrypt JM Xorstr in some x64 binaries]
- https://github.com/timetravelthree/IDARustDemangler [Rust Demangler & Normalizer]
- https://github.com/gmh5225/ida-find-.data-ptr [.data ptr lookup script]
- https://github.com/repnz/ida-plugins [Register Cross References]
- https://github.com/lstaroth/AntiXorstr [Anti Xorstr]
- https://github.com/SentineLabs/AlphaGolang [Analyzing Golang Binaries]
- https://github.com/tmr232/Sark [IDAPython Made Easy]
- https://github.com/govcert-ch/ConfuserEx_IDAPython [Deobfuscation script for ConfuserEx]
- https://github.com/sonyps5201314/pdb [PDB plugin with enhance and bugfix]
- https://github.com/Coldzer0/IDA-For-Delphi [IDA-For-Delphi]
- https://github.com/AntonKukoba1/BetterCallStack [Improve call stack]
- https://github.com/za233/IDADeflat [deflat]
- https://github.com/RomanRybachek/Copy_RVA [Copy RVA]
- https://github.com/RevEngAI/reai-ida [RevEng.AI]
- https://github.com/gaasedelen/microavx [AVX Lifter]
- https://github.com/thalium/ida_kmdf [IDA kmdf]
- https://github.com/zengfr/XrefsExt [XrefsExt plugin]
- https://github.com/sterrasec/genpatch [Python script for patching binary]
- https://github.com/AzzOnFire/yarka [YARA signature creation]
- https://github.com/VirusTotal/vt-ida-plugin [VirusTotal plugin]
- https://github.com/crifan/AutoRename [Auto rename symbol]
- https://github.com/LAC-Japan/IDA_Plugin_AntiDebugSeeker [Extract anti-debugging]
- https://github.com/cseagle/blc [Integrate Ghidra's decompiler]
- https://github.com/Goatman13/ps2_ida_vu_micro [Find and disassembly vu microcode in ps2 executables]
- https://github.com/arizvisa/ida-minsc [Functional DWIM interface]
- https://github.com/wINfOG/IDA_Easy_Life [Deobfuscation]
- https://github.com/senko37/yarascan-ida [Scan file with Yara rules]
- https://github.com/SamuelTulach/ida-unity-pdb-downloader [Unity PDB Downloader]
- https://github.com/TrungNguyen1909/aarch64-sysreg-ida [A IDA plugin to show ARM MSRs nicely]
- https://github.com/danielplohmann/gui-plugin-template [A template for cross-compatible GUI plugins]
- https://github.com/gmh5225/IDA-MapSymbolParser [IDA Map File Symbol Renamer]
- https://github.com/gmh5225/IDA-KallsymsSymbolRenamer [IDA kallsyms Renamer]
- https://github.com/XMCVE/import-kallsyms [IDA Pro Plugin to import /proc/kallsyms for Linux Kernel]
- https://github.com/tomrus88/OpenLumina [Allows connecting to third party Lumina servers]
- https://github.com/stuxnet147/IDA-Assistant [Claude-3 models assistant]
- https://github.com/goseungduk/CE_Tracer-IDA [CheatEngine Value Tracer of IDA]
- https://github.com/binarly-io/idapcode [Displaying the P-Code for the current function]
- https://github.com/ElvisBlue/emotet-deobfuscator [IDA plugin to deobfuscate emotet CFF]
- https://github.com/threatlabz/pikabot-deobfuscator [Deobfuscating Pikabot's strings using RC4 and AES]
- https://github.com/Pycatchown/ClassMaker [IDA plugin to make classes automatically]
- https://github.com/airbus-cert/comida [An IDA Plugin that help analyzing module that use COM]
- https://github.com/Sandspeare/ida2llvm [Lifting IDA Microcode into LLVM IR]
- https://github.com/crtdll/ida-gameguard-str-dec [GameGuard String Decryption]
- https://github.com/kkent030315/IDARustCargo [Displaying potentially installed Cargo dependencies]
- https://github.com/dNop90/dOffset [IDA Pro and Cheat Engine to get the offset of the current module]
- https://github.com/sneakyevil/ida_functioncolor [IDA Plugin to colorize function definition in pseudocode]
- https://github.com/apkunpacker/IDA-Gepetto [IDA plugin which queries Local language models]
- https://github.com/Jackiemin233/Gemini-Genius [IDA python 3 plugin and binary file similarity comparison]
- https://github.com/lj94093/IDAAndroidBreakpoint [IDA plugin aid to set android so breakpoint]
- https://github.com/jonpalmisc/ida_screenshot [High-resolution screenshot capture plugin for IDA Pro]
- https://github.com/JANlittle/IDARustHelper [Small rust binary analysis helper for IDA]
- https://github.com/mefistotelis/ida-pro-loadmap [Plugin for IDA Pro disassembler which allows loading .map files]
- https://github.com/OALabs/hashdb-ida [HashDB API hash lookup plugin for IDA Pro]
- https://github.com/Vu1nT0tal/firmeye [IoT]
- https://github.com/sean2077/big5-decode-ida [IDA Plugin for decoding bytes as big5]
- https://github.com/Vis-Wing/Binoculars [Binoculars is an IDA PRO plugin with an integrated AI interface]
- https://github.com/Reodus/CBS [IDA Plugin to set custom breakpoints on mnemonics]
- https://github.com/matteyeux/IDArling [IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays]
- https://github.com/richor1042/IDAFuncOutline [optimize the readability of decompiled code for iOS ARM64 binaries]
- https://github.com/Dump-GUY/IDA_PHNT_TYPES [Converted phnt to IDA TIL, IDC (Hex-Rays)]
- https://github.com/Mrack/DeObfBR [libtprt.so]
- https://github.com/janisslsm/ida-ps4-helper [A helper plugin for PS4 module loader]
- https://github.com/Antelcat/ida_copilot [ChatGPT Agent analyses your IDA pseudocode]
- https://github.com/crytic/ida-evm [IDA Processor Module for the Ethereum Virtual Machine (EVM)]
- https://github.com/NoneShell/IDAComments [a IDA plugin helps you to manage your IDA Comments]
- https://github.com/emoose/idaxex [Xbox360/Xenon loader plugin for IDA 9]
- https://github.com/junron/auto-enum [automatically identify and set enums for standard functions]
- https://github.com/ViRb3/swift-ida [IDA plugin to aid with Swift reverse engineering]
- https://github.com/Krietz7/IDA-DataExportPlus [a IDA Pro plugin to export data better]
- https://github.com/harlamism/IdaClu [For grouping similar functions]
IDA Signature Database
- https://github.com/push0ebp/sig-database
Binary Ninja Plugins
- https://github.com/Vector35/official-plugins
- https://github.com/Vector35/community-plugins
- https://github.com/FuzzySecurity/BinaryNinja-Themes [Theme]
- https://github.com/EliseZeroTwo/SEH-Helper [SEH Helper]
- https://github.com/Vector35/tanto [Slices Functions]
- https://github.com/ergrelet/triton-bn [Triton]
- https://github.com/google/binexport [BinDiff]
- https://github.com/Pusty/BinaryNinjaPlugins
- https://github.com/borzacchiello/seninja [Symbolic Execution]
- https://github.com/yellowbyte/opaque-predicates-detective
- https://github.com/ex0dus-0x/fuzzable [Fuzzer]
- https://github.com/jmprdi/binja-division-deoptimization [Division and Modulo Deoptimizer]
- https://github.com/Vector35/OpaquePredicatePatcher [Opaque Predicate Patcher]
- https://github.com/jmprdi/binja-division-deoptimization [Division and Modulo Deoptimizer]
- https://github.com/mrphrazer/obfuscation_detection [Collection of scripts to pinpoint obfuscated code]
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine
- https://github.com/seeinglogic/ariadne [Graph Analysis]
- https://github.com/skr0x1c0/binja_kc [Plugin for loading MachO kernelcache and dSYM files]
- https://github.com/Vector35/workflow_objc [Objective-C]
- https://github.com/apekros/binja_sigmaker [Create and find signatures]
- https://github.com/dayzerosec/AMD-SP-Loader [AMD-SP or PSP firmware]
- https://github.com/WhatTheFuzz/binaryninja-openai [Integrates OpenAI]
- https://github.com/dzervas/frinja [Frida plugin for Binary Ninja]
- https://github.com/danielplohmann/gui-plugin-template [A template for cross-compatible GUI plugins]
- https://github.com/ergrelet/themida-spotter-bn [Detect Themida/WinLicense and Code Virtualizer's obfuscated code locations]
- https://github.com/ahaggard2013/binaryninja-ollama [Binary Ninja Ollama]
- https://github.com/0xricksanchez/Shellcoder [BinaryNinja Shellcoder Plugin]
- https://github.com/pd0wm/binaryninja-pcode [This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler]
- https://github.com/zhuzhu-Top/deobf [libtprt.so]
- https://github.com/junron/auto-enum [automatically identify and set enums for standard functions]
Ghidra Plugins
- https://github.com/AllsafeCyberSecurity/awesome-ghidra [List]
- https://github.com/CENSUS/ghidra-frida-hook-gen
- https://github.com/Gekkio/GhidraBoy [Sharp SM83 / Game Boy extension for Ghidra]
- https://github.com/fmagin/ghidra-openai [ChatGPT]
- https://github.com/securityjoes/ThreatResearch [ChatGPT]
- https://github.com/evyatar9/GptHidra [ChatGPT]
- https://github.com/moyix/gpt-wpre [ChatGPT]
- https://github.com/pudii/gba-ghidra-loader [GameBoy]
- https://github.com/MEhrn00/Ghidra_COFFParser [COFF]
- https://github.com/ghidragolf/ghidra_scripts [Scripts]
- https://github.com/PAGalaxyLab/ghidra_scripts [Scripts]
- https://github.com/danbrodsky/GFred [Command Palette]
- https://github.com/Nalen98/AngryGhidra [Use angr in Ghidra]
- https://github.com/justfoxing/ghidra_bridge [Python 3 bridge to Ghidra's Python scripting]
- https://github.com/astrelsky/GhidraOrbis [Orbis OS specific software and file formats]
- https://github.com/astrelsky/Ghidra-Cpp-Class-Analyzer [C++ Class and Run Time Type Information Analyzer]
- https://github.com/DMaroo/GhidRust [Rust decompiler]
- https://github.com/Comsecuris/gdbghidra [GDB session]
- https://github.com/hyuunnn/Hyara [Yara]
- https://github.com/Deatty/Ghidra-Obfuscation-Detection [Detect obfuscated/complex code]
- https://github.com/advanced-threat-research/GhidraScripts [Some scripts]
- https://github.com/fuzzypickles14/BetterStringAnalyzer [A better string analyzer for Ghidra]
- https://github.com/clearbluejar/ghidriff [Python Command-Line Ghidra Binary Diffing Engine]
- https://github.com/Katharsas/ghidra-struct-importer [Struct Importer]
- https://github.com/danielplohmann/gui-plugin-template [A template for cross-compatible GUI plugins]
- https://github.com/astrelsky/GhidraGradlePlugin [Gradle]
Windbg Plugins
- https://github.com/comaeio/SwishDbgExt
- https://github.com/lowleveldesign/comon [Trace COM]
- https://github.com/bruce30262/TWindbg [PEDA-like debugger UI for WinDbg]
- https://github.com/JKornev/cfgdump [Analyze Control Flow Guard map]
- https://github.com/yardenshafir/WinDbg_Scripts [WinDbg scripts]
- https://github.com/long123king/dk [Refactored version of tokenext]
- https://github.com/ch3rn0byl/WinDbg-Extensions [Callback Extension]
- https://github.com/KasperskyLab/WinDbg-JS-Scripts [JS Scripts]
- https://github.com/DumpAnalysis/WinDbg_Copilot [WinDbg Copilot]
X64DBG Plugins
- https://github.com/x64dbg/x64dbg/wiki/Plugins
- https://github.com/horsicq/x64dbg-Plugin-Manager
- https://github.com/m417z/Multiline-Ultimate-Assembler
- https://github.com/x64dbg/Classroom
- https://github.com/VenTaz/Themidie
- https://github.com/Ahmadmansoor/x64dbgScript
- https://github.com/push0ebp/xMalHunter [Detect malicious materials]
- https://github.com/morsisko/xFindOut
- https://github.com/jdavidberger/chaiScriptPlugin
- https://github.com/gmh5225/X64DBG-ViewDllNotification
- https://github.com/legendabrn/AutoAttach
- https://github.com/secrary/idenLib [Generate signatures]
- https://github.com/GregoryMorse/GhidraDec [Ghidra Decompiler]
- https://github.com/x64dbg/x64dbgbinja [Binary Ninja]
- https://github.com/DNLINYJ/Anti_miHoYo_Jcc_Obfuscate
- https://github.com/mrexodia/DisableParallelLoader [Disable parallel loading of dependencies]
- https://github.com/ElvisBlue/x64dbgpython [Running python3 script]
- https://github.com/secrary/idenLibX [Library Function Identification]
- https://github.com/x64dbg/SlothBP [Collaborative Breakpoint Manager]
- https://github.com/Kwansy98/ApiBreakpoint [Api Breakpoint]
- https://github.com/0ffffffffh/yummyPaste [paste string formatted byte data block into x64dbg easy]
- https://github.com/horsicq/x64dbg-Plugin-Manager [Plugin manager for x64dbg]
- https://github.com/ZehMatt/x64dbgPlaytime [Lua script]
- https://github.com/milcert/ExpoMon [Exports monitoring]
- https://github.com/m417z/x64dbg-xfg-marker [Marks XFG call signatures as data]
- https://github.com/Kwansy98/x64dbgCallFinder [Call Finder]
- https://github.com/gmh5225/X64DBG-MapLdr [Loads the map file generated by IDA Pro]
- https://github.com/mibho/x64dbgTraceReader [Trace Reader]
Cheat Engine Plugins
- https://github.com/FreeER/CE-Extensions [Lua Extensions]
- https://github.com/Skyrimfus/CE-lua-extensions [Lua Extensions]
- https://github.com/bbfox0703/Mydev-Cheat-Engine-Tables [CT]
- https://github.com/inuNorii/Elden-Ring-CT-TGA [Elden Ring]
- https://github.com/gmh5225/CE-remap-plugin [Remap]
- https://github.com/gmh5225/overwatch-iat-fixer [Overwatch IAT Fixer]
- https://github.com/FreeER/CE-Examples [Some Examples]
- Porting ce's monodatacollector to android/ios
- https://github.com/DoranekoSystems/wasm-ceserver [Analyzing WebAssembly]
Injection:Windows
- https://github.com/btbd/smap [Scatter Manual Map]
- https://github.com/btbd/modmap [Extend Manual Map]
- https://github.com/KGB-1337/memmap [Extend Manual Map]
- https://github.com/weak1337/ModExMap [Extend Manual Map]
- https://github.com/mactec0/Kernelmode-manual-mapping-through-IAT [IAT Manual Map]
- https://github.com/charliewolfe/Stealthy-Kernelmode-Injector [PTE/VAD Manipulation Manual Map]
- https://github.com/wbenny/injdrv [APC]
- https://github.com/alexkrnl/Kernel-dll-injector [APC]
- https://github.com/w1u0u1/kinject [Map + APC]
- https://github.com/1401199262/RemoteCall [APC Remote Call]
- https://github.com/TheCruZ/Simple-Manual-Map-Injector [Manual Map]
- https://github.com/andrew9382/manual_mapping_dll_injector [Manual Map]
- https://github.com/danielkrupinski/MemJect [Manual Map]
- https://github.com/can1357/ThePerfectInjector [PTE.User]
- https://github.com/dumbasPL/fumo_loader [PTE.User]
- https://github.com/estimated1337/executor [PTE.User]
- https://github.com/Nou4r/PresentInjector [PTE.User]
- https://github.com/JGonz1337/kernel-eac-be-injector [PTE.User]
- https://github.com/Cr4sh/KernelForge [Hijack ROP]
- https://github.com/compiled-code/be-injector [攻擊牛]
- https://github.com/ergrelet/dll-hot-reload [Hot Reload]
- https://github.com/ExpLife0011/KeUserModeCallBack [KeUserModeCallBack]
- KeUserModeCallBack Win10
- https://github.com/YouNeverKnow00/Kernelmode-DLL-Injector [Manual Map]
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking
- https://github.com/Broihon/GH-Injector-Library [inject library and tool]
- https://github.com/5paceman/nightshade [inject tool]
- https://github.com/deepinstinct/Dirty-Vanity [RtlCreateProcessReflection]
- https://github.com/LloydLabs/ntqueueapcthreadex-ntdll-gadget-injection [NtQueueApcThreadEx + gadget]
- https://github.com/3xpl01tc0d3r/ProcessInjection [Various process injection techniques]
- https://github.com/zorftw/lsass-extend-mapper [Manual mapper from LSASS]
- https://github.com/zorftw/revert-mapper [Map x64 DLLs in WoW64]
- https://github.com/SDXT/MMInject [Using NX Bit Swapping and VAD hide]
- https://github.com/Fahersto/code_injection [Several code injection techniques]
- https://github.com/KameronHawk/Kernel-VAD-Injector [Hide VAD]
- https://github.com/nettitude/Tartarus-TpAllocInject [TpAllocInject]
- https://github.com/SafeBreach-Labs/PoolParty [ThreadPool]
- https://github.com/hasherezade/thread_namecalling [SetThreadDescription]
- https://github.com/Cracked5pider/earlycascade-injection [Early Cascade Injection]
Injection:Linux
- https://github.com/ixty/mandibule
Injection:Android
- https://github.com/gmh5225/Android-ModGamesByInjectZygote
- https://github.com/gmh5225/Android-DLL-Injector
- https://github.com/reveny/Android-Ptrace-Injector
- https://github.com/reveny/Android-LD-Preload-Injector
- https://github.com/ohchase/yaui
- https://github.com/cs1ime/AndroidSuperInject [Injecting into SELinux-protected system service processes]
- https://github.com/erfur/linjector-rs [Code injection on Android without ptrace]
- https://github.com/NepMods/InjectARM64 [Non-root injection]
- https://github.com/reveny/Android-Virtual-Inject [Inject through Virtual Space without root permissions]
DLL Hijack
- https://github.com/Sh0ckFR/DLLirant [Hijacking researches]
- https://github.com/redteamsocietegenerale/DLLirant [Hijacking researches Tool]
- https://github.com/knight0x07/ImpulsiveDLLHijack [Hijacking researches]
- https://github.com/wietze/HijackLibs [Project for tracking publicly disclosed DLL Hijacking opportunities]
- https://github.com/gmh5225/DLL-Hijack-ExportDumper [Dump the export table of PE files]
- https://github.com/cyberark/DLLSpy [DLL Hijacking Detection Tool]
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking
- https://github.com/anhkgg/SuperDllHijack [A general DLL hijack technology]
- https://github.com/ctxis/DLLHSC [DLL Hijack SCanner]
鉤
- https://github.com/stars/gmh5225/lists/hook [Lists]
- https://github.com/microsoft/Detours
- https://github.com/wbenny/DetoursNT
- https://github.com/stevemk14ebr/PolyHook
- https://github.com/stevemk14ebr/PolyHook_2_0
- https://github.com/WopsS/RenHook
- https://github.com/bmax121/KernelPatch [Hooking the Linux kernel]
- https://github.com/Zeex/subhook
- https://github.com/axhlzy/PyAsmPatch
- https://github.com/gmh5225/Driver-KDtour [Easy Kernel Detour]
- https://github.com/nelfo/PGHooker [Page Guard]
- https://github.com/weak1337/SkipHook [Skip Hook]
- https://github.com/0mdi/edgegdi_hook [gdi32 .data swap]
- https://github.com/noobpk/frida-android-hook [frida hook for android]
- https://github.com/SamuelTulach/LightHook [cross-platform hook library]
- https://github.com/3intermute/arm64_silent_syscall_hook [ARM64 Patching exception handler]
- https://github.com/kubo/plthook [PLT(Procedure Linkage Table) hook]
- https://github.com/WeiJiLab/kernel-hook-framework [linux kernel inline hook framework]
- https://github.com/Rprop/And64InlineHook [Android ARMv8 inline hook framework]
- https://github.com/GToad/Android_Inline_Hook_ARM64 [Android ARMv8 inline hook framework]
- https://github.com/BossKoopa/BWSR [Arm64 inline hooking for iOS, Android, OSX, and Linux]
- https://github.com/regomne/ilhook-rs [Rust x86]
- https://github.com/iofomo/abyss [Android system call hook]
ROP Finder
- https://github.com/0vercl0k/rp [rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries]
- https://github.com/JonathanSalwan/ROPgadget [This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation]
- https://github.com/helpsystems/Agafi [A gadget finder and a ROP-Chainer tool for x86 platforms]
- https://github.com/hugsy/ropgadget-rs [Another (bad) ROP gadget finder, but this time in Rust]
- https://github.com/Boyan-MILANOV/ropium [ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together]
ROP Generation
- https://github.com/d4em0n/exrop
Anti Signature Scanning
- https://github.com/scrt/avdebugger
RPM
- https://github.com/btbd/access
- https://github.com/crvvdev/intraceptor [access]
- https://github.com/juniorjacob/readwrite-kernel-stable
- https://github.com/DarthTon/Blackbone
- https://github.com/HoShiMin/Kernel-Bridge
- https://github.com/waryas/EUPMAccess
- https://github.com/waryas/UMPMLib
- https://github.com/EBalloon/Remap [Clone process]
- https://github.com/thecruz/efi_driver_access [efi rpm]
- https://github.com/samueltulach/efi-memory [efi rpm]
- https://github.com/ekknod/subgetvariable [efi rpm]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/489305-read-write-process-attach.html
- https://www.unknowncheats.me/forum/anti-cheat-bypass/444289-read-process-physical-memory-attach.html
- https://github.com/gamozolabs/mempeek [linux]
- https://github.com/SamuelTulach/meme-rw [kdmapper]
- https://github.com/gmh5225/driver-rpm-directpagemanipulation [讀取物理記憶]
- https://github.com/btbd/ddma [基於ATA和SCSI的DMA]
- https://github.com/gmh5225/ddma-1 [基於磁盤的ATA和SCSI]
- https://github.com/ekknod/vm [Windows/linux的最小內存庫]
- https://github.com/ALittlePatate/TaxiDriver [W/RPM Driver and usermode for Linux]
- https://github.com/gmh5225/Android-MemoryTool [RPM for Android]
- https://github.com/Poko-Apps/MemKernel [RPM for Android]
- https://github.com/Anonym0usWork1221/C-Android-Memory-Tool [RPM for Android]
- https://github.com/0xenia/remem [RPM for Windows]
- https://github.com/un4ckn0wl3z/DMAInvoker [DMA RPM for Windows]
DMA
- https://github.com/JPShag/DMA-FW-Guide-2.0 [Guide]
- https://github.com/Rakeshmonkee/DMA [Guide]
- https://github.com/PacktPublishing/Learn-FPGA-Programming [Guide]
- https://github.com/enjoy-digital/litepcie [Small footprint and configurable PCIe core]
- https://github.com/ufrisk/pcileech
- https://github.com/ekknod/pcileech-wifi [pcileech-fpga with wireless card emulation]
- https://github.com/Cr4sh/pico_dma
- https://github.com/kWAYTV/dma-cheat-base [Cheat base]
- https://github.com/Spuckwaffel/DMALib [DMA library]
- https://github.com/Metick/DMALibrary [DMA library]
- https://github.com/ekknod/vm [Windows/linux的最小內存庫]
- https://github.com/imerzan/ReClass-DMA [ReClass DMA]
- https://github.com/Metick/CheatEngine-DMA [CheatEngine DMA]
- https://github.com/kaijia2022/Cheat-Engine-DMA-Plugin [CheatEngine DMA]
- https://github.com/bbgsm/MemTools [Windows/Linux DMA testing tools]
- https://github.com/sonodima/physpatch [Scanning and patching of the entire Windows Kernel using DMA]
- https://github.com/gmh5225/DMA-PCIE-BOARD-75T [DMA-PCIE-BOARD-75T]
- https://github.com/gmh5225/DMA-E3100-CFW-BYPASS [DMA-BYPASS-Killer]
W2S
- https://github.com/DrNseven/D3D11-Worldtoscreen-Finder
覆蓋
- https://github.com/coltonon/D2DOverlay
- https://github.com/SurgeGotTappedAgain/Window-Hijack
- https://github.com/SeanPesce/Direct3D9-Overlay [DX9]
- https://github.com/Unkn0wnH4ck3r/GameOverlayUIHook [Steam]
- https://github.com/gmh5225/Steam-Hook-Render-PoC [Steam]
- https://github.com/xo1337/steam-overlay-x64 [Steam]
- https://github.com/Splitx12/StrongSteam [GDI + Steam]
- https://github.com/gmh5225/dwmhook [DWM]
- https://github.com/LoxTus/dwm-overlay [DWM]
- https://github.com/rlybasic/DWM_Hook [DWM]
- https://github.com/mfxiaosheng/dwmhook [DWM VFTable]
- https://github.com/iraizo/nvidia-overlay-hijack [Hijack Nvidia]
- https://github.com/Brattlof/D3DOverlay-Nvidia-Hijack [Hijack Nvidia]
- https://github.com/gmh5225/NVIDIA-OVERLAY [Hijack Nvidia]
- https://github.com/Calvin-LLC/nvidia-overlay-hijack [Hijack Nvidia]
- https://github.com/es3n1n/nvidia-overlay-renderer [Nvidia]
- https://github.com/muturikaranja/overlay [SetWindowsHookEx]
- https://github.com/gmh5225/OBS-graphics-hook32-Hook [OBS Hook]
- https://github.com/plu1337/OBS-Hook [OBS Hook]
- https://github.com/PierreCiholas/NotAnOverlay [Duplicating with GDI]
- https://github.com/SsageParuders/Android_Native_Surface [Android Native Overlay]
- https://github.com/fgsqme/Android_Native_Surface [Android Native Overlay]
- https://github.com/xBrunoMedeiros/eac-overlay [EAC Overlay]
- https://github.com/3r4y/imgui-external-overlay [imgui overlay]
- https://github.com/J0xna/Kernel-Overlay-Hider [Kernel Overlay Hider]
- https://github.com/geeksonsecurity/android-overlay-malware-example [Android]
- https://github.com/SamuelTulach/OverlayCord [Discord]
Render/Draw
- https://github.com/vmcall/dxgkrnl_hook
- https://github.com/thesecretclub/window_hijack [Hijacking thread contexts]
- https://github.com/r1cky33/krnl-gdi-render [Dxgkrnl + GDI]
- https://github.com/BadPlayer555/KernelGDIDraw [Kernel + GDI]
- https://github.com/NSG650/NtDOOM [Kernel + GDI]
- https://github.com/Splitx12/StrongSteam [GDI + Steam]
- https://github.com/Sentient111/KernelDrawing [Drawing from kernelmode without any hooks]
- https://github.com/wbaby/DoubleCallBack [DWM In Kernel]
- https://github.com/cs1ime/KernelDwm [DWM In Kernel]
- https://github.com/gmh5225/DWM-DwmDraw [DWM StackWalk]
- https://github.com/Yukin02/Dwm-Overlay [DWM Overlay without modify .text]
- https://github.com/Polarmods/PolarImGui [Imgui On Android]
- https://github.com/vrolife/android_native_app_imgui [Imgui On Android]
- https://github.com/LGLTeam/Android-Mod-Menu [Floating mod menu for Android]
- https://github.com/springmusk026/ImGui-Unity-With-Layout [Imgui For Unity]
- https://github.com/springmusk026/Imgui-Unity [Imgui For Unity]
- https://github.com/gmh5225/Android-Mod-Menu-ImGui [Imgui For Unity]
- https://github.com/Octowolve/Unity-ImGUI-Android [Imgui For Unity]
- https://github.com/lbertitoyt/ImGUI-Zygisk-Unity [Imgui For Unity]
- https://github.com/gmh5225/zygisk-imgui-modmenu [ImGui with Zygisk]
- https://github.com/gmh5225/ImGui-Unity-Android [Imgui For Unity]
- https://github.com/gmh5225/BepInEx-IL2CPPBase [IL2CPP Menu]
- https://github.com/springmusk026/Android-Mod-Menu-Kotlin [IL2CPP Menu]
- https://github.com/gmh5225/Android-OpenGL-ES-Chams [Chams]
- https://github.com/RequestFX/ImGUI-Advanced-Cheat-Menu [Imgui Menu]
- https://github.com/gmh5225/External-imgui-Cheat-Menu-Example-2023 [External Imgui Menu]
- https://github.com/gmh5225/External-ImGui-Android [External Imgui Menu for Android]
- https://github.com/xProHackerx/imgui-ios-mod-menu [Imgui Menu for IOS]
- https://github.com/sy1ntexx/egui-d3d11 [Menu]
- https://github.com/springmusk026/Android-ModMenu-SemiJni [Menu for imgui]
- https://github.com/fedes1to/Zygisk-ImGui-Menu [ImGui menu using Zygisk]
- https://github.com/reveny/Zygisk-ImGui-Mod-Menu [ImGui menu using Zygisk]
- https://github.com/s4m33r89/Imgui-Native-ModMenu [Imgui Menu for Android]
- https://github.com/joeyjurjens/iOS-Mod-Menu-Template-for-Theos [IOS mod menu]
UI接口
- https://github.com/adamhlt/ImGui-Standalone
Vulnerable Driver
- https://www.loldrivers.io/drivers
- https://github.com/magicsword-io/LOLDrivers
- https://github.com/rtfmkiesel/loldrivers-client [Scan loldrivers]
- https://github.com/FourCoreLabs/LolDriverScan [Scan loldrivers]
- https://github.com/trailofbits/HVCI-loldrivers-check [HVCI loldrivers check]
- https://github.com/hacksysteam/HackSysExtremeVulnerableDriver [Guide]
- https://github.com/xct/windows-kernel-exploits [Guide]
- https://github.com/namazso/physmem_drivers [Vulnerable Driver List]
- https://github.com/alfarom256/drivers_and_shit [Vulnerable Driver List]
- https://github.com/NullArray/WinKernel-Resources/tree/main/Drivers [Vulnerable Driver List]
- https://github.com/CaledoniaProject/drivers-binaries [Vulnerable Driver List]
- https://github.com/Xxmmy/vulnerable-driver-scanner [Scans for vulnerable drivers]
- https://github.com/Sentient111/VulnerableDriverScanner [Scans for vulnerable drivers]
- https://github.com/shareef12/cpuz [CPU-Z]
- https://github.com/SamLarenN/CPUZ-DSEFix [CPU-Z]
- https://github.com/gmh5225/gdrv-loader/tree/1909_mitigation [gdrv.sys]
- https://github.com/backengineering/VDM [gdrv enhance]
- https://github.com/Compiled-Code/eac-mapper [gdrv.sys]
- https://github.com/gmh5225/CVE-2018-19320-LPE [gdrv.sys]
- https://github.com/gmh5225/CVE-2018-19320 [gdrv.sys]
- https://github.com/gmh5225/gdriver-lib [gdrv.sys]
- https://github.com/holi4m/gdrv-loader-v2 [gdrv.sys]
- https://github.com/gmh5225/KDP-compatible-driver-loader [gdrv.sys]
- https://github.com/1337kenzo/gdrv-loader-updated [gdrv.sys Win11]
- https://github.com/eddeeh/kdmapper [iqvw64e.sys]
- https://github.com/TheCruZ/kdmapper [iqvw64e.sys]
- https://github.com/Brattlof/kdmapper-1909 [iqvw64e.sys]
- https://github.com/paysonism/saturn-mapper [iqvw64e.sys]
- https://github.com/rmccrystal/kdmapper-rs [A kdmapper library for Rust]
- https://github.com/kkent030315/MsIoExploit [MsIo64.sys]
- https://github.com/gmh5225/VulnerableKernel_Driver [MsIo64.sys]
- https://github.com/kkent030315/evil-mhyprot-cli [Mhyprot2.sys]
- https://github.com/leeza007/evil-mhyprot-cli [Mhyprot2.sys]
- https://github.com/zer0condition/mhydeath [Mhyprot2.sys]
- https://github.com/keowu/mhyprot2 [Mhyprot2.sys]
- https://github.com/kagurazakasanae/Mhyprot2DrvControl [Mhyprot2.sys]
- https://github.com/gmh5225/CVE-2020-36603 [Mhyprot2.sys]
- https://github.com/tanduRE/AvastHV [Avast]
- https://github.com/iPower/KasperskyHook [Kaspersky]
- https://github.com/SamuelTulach/EvilKaspersky [Kaspersky]
- https://github.com/mathisvickie/CVE-2021-21551 [dbutil_2_3.sys]
- https://github.com/ch3rn0byl/CVE-2021-21551 [dbutil_2_3.sys]
- https://github.com/SpikySabra/Kernel-Cactus [dbutil_2_3.sys]
- https://github.com/mzakocs/CVE-2021-21551-POC [dbutil_2_3.sys]
- https://github.com/Flerov/TS-Fucker [dbutil_2_3.sys]
- https://github.com/Splitx12/imxyviMapper [AsUpIO.sys]
- https://github.com/archercreat/vdk [Speedfan.sys]
- https://github.com/SamLarenN/SpeedFan-Exploit [Speedfan.sys]
- https://github.com/Gbps/CapcomLib [Capcom.sys]
- https://github.com/es3n1n/dolboeb-executor [Capcom.sys]
- https://github.com/SamLarenN/CapcomDKOM [Capcom.sys]
- https://github.com/Exploitables/CVE-2015-2291 [IQVW64.sys]
- https://github.com/KiFilterFiberContext/AsIO-Exploit [AsIO3.sys]
- https://github.com/IamM47Z/OpenHardwareMonitor-PoC [OpenHardwareMonitorLib.sys]
- https://github.com/RedCursorSecurityConsulting/PPLKiller [RTCore64.sys]
- https://github.com/Processus-Thief/PsNotifRoutineUnloader [RTCore64.sys]
- https://github.com/zeze-zeze/CYBERSEC2023-BYOVD-Demo [RTCore64.sys]
- https://github.com/oakboat/RTCore64_Vulnerability [RTCore64.sys]
- https://github.com/ReCryptLLC/CVE-2022-42045 [amsdk.sys]
- https://github.com/gmh5225/CVE-2022-3699 [LenovoDiagnosticsDriver.sys]
- https://github.com/estimated1337/lenovo_mapper [LenovoDiagnosticsDriver.sys]
- https://github.com/estimated1337/lenovo_exec [LenovoDiagnosticsDriver.sys]
- https://github.com/kkent030315/CVE-2022-42046 [wfshbr64.sys]
- https://github.com/tijme/amd-ryzen-master-driver-v17-exploit [AMD's Ryzen Master Driver]
- https://github.com/OmriBaso/RToolZ [ProcExp152.sys]
- https://github.com/SamuelTulach/nullmap [Afd.sys]
- https://github.com/gmh5225/Windows-10-22H2-Vulnerable-driver-communication [asromgdrv.sys]
- https://github.com/alfarom256/HPHardwareDiagnostics-PoC [etdsupp.sys]
- https://github.com/ZeroMemoryEx/Blackout [gmer64.sys]
- https://github.com/ZeroMemoryEx/Terminator [zam64.sys]
- https://github.com/gmh5225/zam64-zemina [zam64.sys]
- https://github.com/gmh5225/CVE-2017-9769 [rzpnk.sys]
- https://github.com/kite03/echoac-poc [echo_driver.sys]
- https://github.com/pseuxide/kur [echo_driver.sys]
- https://github.com/gmh5225/NVDrv [nvaudio.sys]
- https://github.com/gmh5225/UCMapper [nvaudio.sys]
- https://github.com/zeze-zeze/HITCON-2023-Demo-CVE-2023-20562 [AMDCpuProfiler.sys]
- https://github.com/keowu/BadRentdrv2 [rentdrv2.sys]
- https://github.com/gmh5225/S4Mapper [SignalRgbDriver.sys]
- https://github.com/gmh5225/dse_hook [winio64.sys]
- https://github.com/enkomio/s4killer [probmon.sys]
- https://github.com/floesen/KExecDD [KSecDD.sys]
- https://github.com/scrt/KexecDDPlus [KSecDD.sys]
- https://github.com/varwara/CVE-2024-26229 [csc.sys]
- https://github.com/zer0condition/ZeroHVCI [csc.sys]
- https://github.com/gmh5225/Win-Driver-EXP/tree/main/CVE-2024-33218 [AsUpIO64.sys]
- https://github.com/gmh5225/Win-Driver-EXP/tree/main/CVE-2024-30804 [AsInsHelp64.sys]
- https://github.com/gmh5225/CVE-2020-14974 [IObitUnlocker.sys]
- https://github.com/CyberSecurityUP/ProcessKiller-BYOVD [viragt64.sys]
- https://github.com/CyberSecurityUP/UrekMazino-Malware [viragt64.sys]
- https://github.com/MrAle98/ATDCM64a-LPE [atdcm64a.sys]
- https://github.com/varwara/CVE-2024-35250 [ks.sys]
- https://github.com/varwara/CVE-2024-21338 [appid.sys]
Driver Communication
- https://github.com/gmh5225/Driver-Communication-List
- https://github.com/gmh5225/ida-find-.data-ptr [.data ptr lookup script]
- https://github.com/EBalloon/Common-Registry [Registry Callback]
- https://github.com/gmh5225/Common-Registry-Jmp-RCX [Registry Callback]
- https://github.com/0xGREG/registry-callbacks [Registry Callback]
- https://github.com/adrianyy/rw_socket_driver [Socket]
- https://github.com/zoand/BOOM [Hijack Beep.sys]
- https://github.com/gmh5225/Driver-read_write [Hijack IRP Beep.sys]
- https://github.com/isoadam/gina_public [Hijack IRP Null]
- https://github.com/Barracudach/Swap-control-ioctl [Hijack IRP SpeedFan.sys]
- https://github.com/adspro15/km-um-communication
- https://github.com/Spuckwaffel/Kernel-Thread-Driver [Thread]
- https://github.com/Astronaut00/DoubleDataPointer [Double Data Pointer]
- https://github.com/btbd/access [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter]
- https://github.com/paradoxwastaken/Poseidon [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter]
- https://github.com/FarmEquipment69/umap-mapper [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter]
- https://github.com/weak1337/EvCommunication [NtTokenManagerCreateFlipObjectReturnTokenHandle]
- https://github.com/gmh5225/Driver-kaldereta [NtTokenManagerGetAnalogExclusiveTokenEvent]
- https://github.com/UCFoxi/Shared-FlushFileBuffers-Communication [FlushFileBuffers]
- https://github.com/gmh5225/UCFoxi-Shared-FlushFileBuffers-Communication-Update FlushFileBuffers]
- https://github.com/Sinclairq/DataCommunication [NtCompareSigningLevels]
- https://github.com/ExpLife0011/NtCompareSigningLevel-hook [NtCompareSigningLevels]
- https://github.com/muturikaranja/AfdIrpCallDispatch [.data Pointer hook in Afd.sys]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/483093-vtable-kernel-function-hook-communication.html [NtUserMessageCall]
- https://github.com/EBalloon/MapPage [NtUserGetObjectInformation]
- https://github.com/Compiled-Code/eac-mapper [NtMapVisualRelativePoints]
- https://github.com/gmh5225/eac-bypass-1 [NtMapVisualRelativePoints]
- https://git.back.engineering/_xeroxz/NtWin32k [NtUserGetThreadState]
- https://github.com/sbsbsbssbsbs/boundcallback [KeRegisterBoundCallback]
- https://github.com/Skengdoo/DataPtrSwap-driver [NtSetCompositionSurfaceAnalogExclusive]
- https://github.com/xPasters/.data-ptr-swap [NtSetCompositionSurfaceAnalogExclusive]
- https://github.com/ryan-weil/ReadWriteDriver [NtUserSetSysColors]
- https://github.com/D3DXVECTOR2/NtUserUpdateWindowTrackingInfo [NtUserUpdateWindowTrackingInfo]
- https://github.com/KiFilterFiberContext/windows-software-policy [clip]
- https://github.com/gmh5225/Interep-Driver-Leak [NtGdiPolyPolyDraw]
- https://github.com/gmh5225/Comm-data-ptr-driver [NtGdiPolyPolyDraw]
- https://github.com/JGonz1337/kernel-eac-be-comm [NtGdiPolyPolyDraw]
- https://github.com/Lynnette177/Rigel-Driver [NtGdiDdDDINetDispGetNextChunkInfo]
- https://github.com/NullTerminatorr/NullHook [NtDxgkGetTrackedWorkloadStatistics]
- https://github.com/gmh5225/Kernel-Cheat-for-directx3D [NtDxgkGetTrackedWorkloadStatistics]
- https://github.com/gmh5225/Comm-Data-Pointer-Swap [NtDCompositionSetChildRootVisual]
- https://github.com/gmh5225/Comm-NekoSwap [Win32kApiSetTable]
- https://github.com/Deputation/kernel_payload_comms [Shared Memory]
- https://github.com/chase1803/ucmiraka-valorantexternal [ntusergetPoInterpropriparyId]
- https://github.com/gmh5225/Comm-ImMiraclela [NtDxgkGetTrackedWorkloadStatistics/NtDxgkGetAvailableTrackedWorkLoadIndex]
- https://www.unknowncheats.me/forum/2976731-post45.html [IsWin32KSyscallFiltered]
- https://github.com/J0xna/Kernel-Overlay-Hider [NtMITPostWindowEventMessage]
- https://github.com/gmh5225/Eac-Injector-Driver [NtQueryIntervalProfile]
- https://github.com/gmh5225/job_communication [NtQueryInformationJobObject]
- https://github.com/estimated1337/custom_data_ptr_swap_sample [NtQueryLicenseValue]
- https://github.com/zer0condition/ZeroThreadKernel [NtCreateCompositionSurfaceHandle]
- https://github.com/gmh5225/NullDriverCheat [NtOpenCompositionSurfaceSectionInfo]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/560809-firmwaretablehandler.html [FirmwareTableHandler]
EFI Driver
- https://github.com/mrexodia/EfiCMake
- https://github.com/tandasat/MiniVisorPkg
- https://github.com/Oliver-1-1/SmmInfect [SMM Driver]
- https://github.com/Shtan7/VisualUEFI-2.0 [Debug source with clion+clang+gdb]
- https://github.com/SamuelTulach/EasyUefi [Visual Studio template for GNU-EFI]
- https://github.com/btbd/umap [EFI Manual Map]
- https://github.com/ekknod/sumap [EFI Manual Map]
- https://github.com/xtremegamer1/xigmapper [EFI Manual Map]
- https://github.com/Valthrun/valthrun-uefi-mapper [EFI Manual Map]
- https://github.com/ekknod/KiSystemStartupMeme [Custom KiSystemStartup]
- https://github.com/SamuelTulach/efi-memory [RPM]
- https://github.com/TheCruZ/EFI_Driver_Access [RPM]
- https://github.com/gmh5225/Driver-efi-bootkit
- https://github.com/SamuelTulach/rainbow [HWID]
- https://github.com/gmh5225/-Rainbow---EFI [HWID]
- https://github.com/Kiaoee/Fortnite-EFI-External [Fortnite]
- https://github.com/ajkhoury/UEFI-Bootkit
- https://github.com/SamuelTulach/negativespoofer [HWID]
- https://github.com/SamuelTulach/EfiDump [Dump]
- https://github.com/ekknod/Nmi [Blocking NMI interrupts]
- https://github.com/ekknod/smm [SMM作弊]
- https://github.com/sa413x/UEFI-Bootloader [Simple mmapper which using UEFI runtime driver]
- https://github.com/realoriginal/bootlicker [Generic UEFI bootkit used to achieve initial usermode execution]
- https://github.com/ekknod/efi-monitor [Hooking MmCopyMemory PG safe]
- https://github.com/leap0x7b/luaboot [A fully scriptable UEFI bootloader]
- https://github.com/Cr4sh/SmmBackdoorNg [UEFI backdoor]
- https://github.com/Oliver-1-1/UEFI-Graphic [Simpel usage of graphic in UEFI]
- https://github.com/Jamesits/BGRTInjector [Changes the boot screen image on a UEFI computer]
QEMU/KVM/PVE
- https://github.com/david942j/kvm-kernel-example [Guide]
- https://github.com/airbus-seclab/qemu_blog [Guide]
- https://github.com/BigAnteater/KVM-GPU-Passthrough [GPU Passthrough]
- https://github.com/dmaivel/ntoseye [Kernel Debugger]
- https://github.com/ispras/qemu/tree/windbg [Windbg]
- https://github.com/cyberus-technology/virtualbox-kvm [VirtualBox with KVM Backend]
- https://github.com/Qemu-Gang
- https://github.com/memflow/memflow-kvm
- https://github.com/IntroVirt/IntroVirt [Guest introspection library]
- https://github.com/MisterY52/apex_dma_kvm_pub
- https://github.com/SamuelTulach/BetterTiming [Bypass CPU Timing]
- https://github.com/WCharacter/RDTSC-KVM-Handler [Bypass RDTSC]
- https://github.com/batusan/Hardened-qemu [Hidden QEMU]
- https://github.com/zhaodice/qemu-anti-detection [Hidden QEMU]
- https://github.com/kila58/qemu-patched [Hidden QEMU]
- https://github.com/Scrut1ny/Hypervisor-Phantom [Hidden QEMU]
- https://github.com/zhaodice/proxmox-ve-anti-detection [Hidden PVE]
- https://github.com/tteck/Proxmox [PVE Helper Scripts]
- https://github.com/nyx-fuzz/QEMU-Nyx [Intel-PT]
- https://github.com/doomedraven/Tools/blob/master/Virtualization/kvm-qemu.sh [QEMU Script]
- https://github.com/GlacierW/MBA [QEMU Malware Behavior Analyzer]
- https://github.com/Qemu-Gang/Escape-from-TuxKov [EFT]
- https://github.com/LWSS/Ape-ex-Abominations [Apex]
- https://github.com/Qemu-Gang/QemuUnrealDumper-4.25 [UE SDK Dump By QEMU]
- https://github.com/panda-re/panda [Platform for Architecture-Neutral Dynamic Analysis]
- https://github.com/cs1ime/blacksun-framework [Framework for game cheat development]
- https://github.com/cs1ime/ceserver-rawmem [CE]
- https://github.com/gmh5225/kvm-csgo-cheat [CSGO]
- https://github.com/atombottle/cs2_kvm_dma [CS2]
- https://github.com/gmh5225/cs16-trigger-kvm [CS1.6]
- https://github.com/tenclass/mvisor [C++ remake]
- https://github.com/k3v1n1990s/docker-win [wsl2]
- https://github.com/SingularityCloud/KVM.Performance [ioapic]
- https://github.com/xqemu/xqemu [Play original Xbox games]
葡萄酒
- https://github.com/valvesoftware/proton [Steam]
反屏幕截圖
- https://github.com/kankoshev/noscreen [hide窗口]
- https://github.com/gmh5225/dwmhook [DWM]
- https://github.com/wongfei/wda_monitor_trick
- https://github.com/mes2d/screenshot-detection-bypass [bitblt]
欺騙堆棧
- https://github.com/mgeeky/ThreadStackSpoofer
- https://github.com/danielkrupinski/x86RetSpoof
- https://github.com/Apex-master/return-address-spoofing
- https://github.com/Peribunt/Exception-Ret-Spoofing
- https://github.com/Peribunt/Ret-Spoofing
- https://github.com/WithSecureLabs/CallStackSpoofer
- https://github.com/Barracudach/CallStack-Spoofer
- https://github.com/frkngksl/NimicStack
- https://github.com/thesecretclub/callout-poc
- https://github.com/veryboreddd/Return-address-spoofer
- https://www.unknowncheats.me/forum/anti-cheat-bypass/512002-x64-return-address-spoofing.html
- https://github.com/Kudaes/Unwinder [Another approach to thread stack spoofing]
- https://github.com/klezVirus/SilentMoonwalk [a TRUE call stack spoofer]
- https://github.com/gmh5225/spoof-stack-SafeCall [header only]
- https://github.com/fortra/hw-call-stack [HWBP]
- https://github.com/evilashz/ProxyAPICall [Custom stack call]
- https://github.com/Kudaes/Shelter [ROP-based sleep obfuscation]
- https://github.com/susMdT/LoudSunRun [Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven]
- https://github.com/NtDallas/Fenrir [Stack spoofing using jmp rdi]
隱藏
- https://github.com/JKornev/hidden
- https://github.com/sina85/hide-file [Hide File]
- https://github.com/ch3rn0byl/ANTfs [Delete File]
- https://github.com/kankoshev/noscreen [hide窗口]
- https://github.com/gmh5225/WindowProtect [Hide Window]
- https://github.com/nlepleux/MappedCallback [Hide Callback]
- https://github.com/rogerxiii/kernel-codecave-poc [Find Codecave]
- https://github.com/armvirus/SinMapper [Manual Map In Signed Driver]
- https://github.com/0xf1a/DSMM [Discarded Driver Section Manual Map]
- https://github.com/ekknod/sumap [EFI Manual Map]
- https://github.com/VollRagm/lpmapper [Manual Map To Large Page Driver]
- https://github.com/armvirus/CosMapper [Signed Driver Map]
- https://github.com/gmh5225/HideDriverTesting [Hide Driver]
- https://github.com/IcEy-999/Drv_Hide_And_Camouflage [Hide Driver]
- https://github.com/BadPlayer555/TraceCleaner [Driver Trace Cleaner]
- https://github.com/Sentient111/ClearDriverTraces [Driver Trace Cleaner]
- https://github.com/KelvinMsft/NoTruth [Hide Memory By VT]
- https://github.com/EBalloon/MapPage [Self Map Driver]
- https://github.com/Compiled-Code/eac-mapper [Self Map Driver]
- https://github.com/nbqofficial/HideDriver [Hide Driver By Modify Flink/Blink]
- https://github.com/ExpLife0011/HideDriver [Hide Driver By MiProcessLoaderEntryk]
- https://github.com/gmh5225/Driver-HideKernelThread-IoCancelIrp [Hide Kernel Thread]
- https://github.com/kitty8904/blanket [Hide Kernel Thread]
- https://github.com/jxy-s/herpaderping [Hide Process/File]
- https://github.com/Cracked5pider/KaynStrike [Spoofs Thread Start Address]
- Using .reloc section to replace the typical allocation calls
- https://github.com/longpoxin/hideroot [Magisk]
- https://github.com/Rwkeith/Diglett [Hide Kernel Thread]
- https://github.com/gmh5225/Driver-SessionMapper [Session Driver]
- https://github.com/gmh5225/Map-file-in-system-space [MiMapViewInSystemSpace]
- https://github.com/gmh5225/Driver-DriverNoImage [Hijack Driver]
- https://github.com/gmh5225/Driver-Systemthread-from-PspCidTable-src [Hide Process/Thread/Handle]
- https://github.com/reveny/Android-Library-Remap-Hide [Remap a library for Android]
Anti Forensics
- https://github.com/PaulNorman01/Forensia
- https://github.com/ashemery/Anti-Forensics
Triggerbot & Aimbot
- https://github.com/changeofpace/MouHidInputHook
- https://github.com/gmh5225/AcDrv [mouse hook]
- https://github.com/ekknod/MouseClassServiceCallbackTrick
- https://github.com/ekknod/MouseClassServiceCallbackMeme
- https://github.com/blackhades00/PareidoliaTriggerbot
- https://github.com/adspro15/DirectInput
- https://github.com/nbqofficial/norsefire
- https://github.com/petercunha/Pine [Neural Network]
- https://github.com/gmh5225/AI-FPS-b00m-h3adsh0t [Neural Network]
- https://github.com/univrsal/input-overlay [Keyboard Mapper]
- https://github.com/Miffyli/gan-aimbots [Machine Learning]
- https://github.com/RootKit-Org/AI-Aimbot [Machine Learning YOLOv5]
- https://github.com/lehmenkuehler/camera-triggerbot [Camera Triggerbot]
- https://github.com/BuddyBoi/KernelMoveMouse [gptCursorAsync]
- https://github.com/Zpes/mouse-input-injection [NtUserInjectMouseInput]
- https://github.com/gmh5225/Overwatch-1-cheat-source [NtUserInjectMouseInput]
- https://github.com/gmh5225/NtUserInjectMouseInput-syscall [NtUserInjectMouseInput SYSCALL]
- https://github.com/gmh5225/ClickPic [OpenCV + Triggerbot]
- https://github.com/gmh5225/OpenCV-SmartAimBot [OpenCV + Triggerbot]
- https://github.com/Lexikos/AutoHotkey_L
- https://github.com/tgillam/HumanMouseMovement
- https://github.com/Chaoses-Ib/IbInputSimulator [Simulating keyboard, mouse]
- https://github.com/ekknod/logitech-cve [logitech]
- https://github.com/gmh5225/razer-rzctl [Razer]
- https://github.com/vsaint1/kernel-mouse [MouClass]
- https://github.com/gmh5225/android_touch [For Android]
- https://github.com/muchenspace/android_virtualTouch [For Android]
- https://github.com/gmh5225/PTFakeTouch [For IOS]
WallHack
- https://github.com/DrNseven/D3D11-Wallhack
hwid
- https://github.com/dword64/Ow-Anti-Flag
- https://github.com/btbd/hwid
- https://github.com/gmh5225/Driver-HWID-btbd-modified
- https://github.com/gmh5225/HWID-Permanent-HWID-Spoofer
- https://github.com/gmh5225/PrecisionSpoofer-CPP
- https://github.com/Theordernarkoz/Hwid-Spoofer-EAC-BE
- https://github.com/semihcevik/hwidspoofer
- https://github.com/Theordernarkoz/Hwid--Spoofer
- https://github.com/Theordernarkoz/Hwid-Spoofer
- https://github.com/gmh5225/Apex-Spoofer
- https://github.com/gmh5225/HWID-EclipsedSpoofer-EAC-BE
- https://github.com/BuzzerFelix/HWIDSpooferEAC
- https://github.com/SamuelTulach/rainbow [EFI]
- https://github.com/firebitsbr/-Rainbow---EFI [EFI]
- https://github.com/btbd/wpp [Intercepting DeviceControl via WPP]
- https://github.com/vmcall/owned_alignment [Abusing Alignment]
- https://github.com/mopped7/Hwid-Spoofer-Game-Anticheat-Cleaners-Unban-Any-Games-Drivers
- https://github.com/gmh5225/HWID-Kernel-Spoofer
- HWID-Spoofer-UD-Fortnite-WarZone-Apex-Rust-Escape-From-Tarkov-and-all-EAC-BE-Games-IMGUI-Loader-Base
- https://github.com/SamuelTulach/mutante
- https://github.com/Veuqx0/ImGui-Spoofer-Leaked
- https://github.com/gupr0x4/HWID-Spoofer-for-Fortnite-and-Valorant
- https://github.com/gmh5225/Full-Hwid-Spoofer-V6
- https://github.com/gmh5225/HWID-SteamSpywareTerminator [Steam]
- https://github.com/SamuelTulach/negativespoofer [EFI]
- https://github.com/Alex3434/wmi-static-spoofer
- https://github.com/ReFo0/hwid-spoofer
- https://github.com/namazso/hdd_serial_spoofer
- https://github.com/gmh5225/EASY-HWID-SPOOFER
- https://github.com/singhhdev/Spoofer-AMIDEWIN
- https://github.com/gmh5225/HWID-Pasted-Hwid-Spoofer
- https://github.com/Skotschia/hwid_spoofer
- https://github.com/SamuelTulach/tpm-spoofer [TPM]
- https://github.com/s0ngidong3/TPM-SPOOFER [TPM]
- https://github.com/Android1500/AndroidFaker [Android]
Bypass Page Protection
- https://github.com/illegal-instruction-co/CountHook [WorkingSet]
SDK CodeGen
- https://github.com/cursey/sdkgenny
- https://github.com/praydog/luagenny
- https://github.com/ssyuqixe/obfCoder
Game Engine Explorer:Unreal
- https://github.com/UE4SS-RE [UE RE]
- https://github.com/asjbdkabs/shootergame-Hack [ShooterGame Demo]
- https://github.com/cqcallaw/shootergame [ShooterGame Demo]
- https://github.com/CorrM/CleanCheat [Game cheat base]
- https://github.com/trumank/patternsleuth [Unreal Engine address scanner and test suite]
- https://github.com/Encryqed/Dumper-7 [SDK Dump for all of UE4 and UE5]
- https://github.com/Spuckwaffel/UEDumper [SDK Dump for UE 4.19 - 5.2]
- https://github.com/BadBrojo/UEDumper-MemProcFS [UEDumper+MemProcFS 4.19 - 5.2]
- https://github.com/Chuan212/UnrealSDKDumper [SDK Dump for UE 4.23 - 4.27]
- https://github.com/BobHUnrealTech/UnrealSDKDumper-4.25 [SDK Dump for UE 4.23 - 4.27]
- https://github.com/Shhoya/Shh0yaUEDumper [SDK Dump]
- https://github.com/guttir14/UnrealDumper-4.25 [SDK Dump]
- https://github.com/EZFNDEV/UEDumper [SDK Dump]
- https://github.com/gmh5225/frida-ue4dump [SDK Dump For Android/IOS]
- https://github.com/MJx0/AndUE4Dumper [SDK Dump For Android]
- https://github.com/kp7742/UE4Dumper [SDK Dump For Android]
- https://github.com/gmh5225/UE4-Apk-Dumper [SDK Dump For Android]
- https://github.com/Zakaria-Master/UE4Dumper_Emulator [SDK Dump For Android]
- https://github.com/BigWhite666/BigWhiteTool [SDK Dump For Android]
- https://github.com/MJx0/iOS_UE4Dumper [SDK Dump For IOS]
- https://github.com/yring-me/ts-ue4dumper [TypeScript and Frida UE4dumper]
- https://github.com/CorrM/Unreal-Finder-Tool [SDK View]
- https://github.com/spudgy/UnrealEngine4-SwissKnife [SDK View]
- https://github.com/shalzuth/UnrealSharp [SDK View]
- https://fearlessrevolution.com/viewtopic.php?f=23&t=14414 [UE4 CE Table]
- https://github.com/cursey/ue4genny [SDK Generator]
- https://github.com/Zebratic/UE4Injector [Inject]
- https://github.com/N-T33/UE4-Silent-Aim [Aimbot]
- https://github.com/YMY1666527646/ue4_base [SDK Template]
- https://github.com/percpopper/UE4-Freecam [FOV Changer]
- https://github.com/RussellJerome/UnrealModLoader [Mod Loader]
- Intercept ProcessEvent calls on any game object (Unreal Engine 4)
- UE4 Cheat Source Code
- https://github.com/bbgsm/ue4_cheat_engine [UE4 Cheat For Android]
- unpack, pack, list, check and mount Unreal Engine 4 .pak archives
- https://github.com/Qemu-Gang/QemuUnrealDumper-4.25 [SDK Dump By QEMU]
- https://github.com/gmh5225/UE-UnrealEngineSDK [Universal Cheat development kit]
- https://github.com/atenfyr/uassetgui [查看和修改UE4遊戲資產]
- https://github.com/UE-Explorer/UE-Explorer [Browser and decompiler for UE packages]
- https://github.com/UE4SS-RE/RE-UE4SS [Re-Host of Unreal Engine 4/5 Scripting System]
- https://github.com/SerseDioRe/Unreal-Engine-5-PDB [UE5 PDB]
Game Engine Explorer:Unity
- https://github.com/mono/mono [mono]
- https://github.com/dnSpy/dnSpy-Unity-mono [mono]
- https://github.com/Misaka-Mikoto-Tech/MonoHook [mono hook]
- https://github.com/dnSpy/Mono.Debugger.Soft [Mono Debugger]
- https://github.com/imerzan/unispectDMAPlugin [Mono Dump + DMA]
- https://github.com/Perfare/Il2CppDumper [Il2Cpp Dump]
- https://github.com/khang06/Il2CppDumper-YuanShen [Il2Cpp Dump for Genshin Impact]
- https://github.com/Perfare/Il2CppDumper [Il2Cpp Dump GUI]
- https://github.com/Poko-Apps/Il2cppDumpDroidGUI [Il2Cpp Dump GUI]
- https://github.com/shalzuth/Il2CppRuntimeDumper [Il2Cpp Dump Runtime]
- https://github.com/Perfare/Zygisk-Il2CppDumper [Il2Cpp Dump for Android Platform]
- https://github.com/kp7742/IL2CPPDumper [Il2Cpp Dump for Android Platform]
- https://github.com/yukiarrr/Il2cppSpy [Unity IL2CPP Disassembler (for apk)]
- https://github.com/djkaty/Il2CppInspector [Il2Cpp Dump]
- https://github.com/oobbb/android-il2cpp-modspeed [Il2Cpp hack speed]
- https://github.com/gmh5225/qiling-il2cpp-dump [Il2Cpp Dump using qiling]
- https://github.com/sinai-dev/UnityExplorer
- https://github.com/4ch12dy/il2cpp [Il2Cpp Version]
- https://github.com/nneonneo/Il2CppVersions [Il2Cpp Version]
- https://github.com/sneakyevilSK/IL2CPP_Resolver [IL2CPP resolver]
- https://github.com/extremeblackliu/IL2CPP_Resolver_External [IL2CPP resolver]
- https://github.com/knah/Il2CppAssemblyUnhollower
- https://github.com/reahly/mono-external-lib [External Mono Example]
- https://github.com/Compiled-Code/external-il2cpp [Il2Cpp]
- https://github.com/Octowolve/Il2CppSDKGenerator [Il2Cpp SDK generator for Android]
- https://github.com/00christian00/UnityDecompiled [An unofficial repo of decompiled Unity dll files]
- https://github.com/knah/Il2CppAssemblyUnhollower [Managed->IL2CPP proxy assemblies]
- https://github.com/CodeCracker-Tools/MegaDumper [Dump native and .NET assemblies]
- https://github.com/SeriousCache/UABE [Extracting assets]
- https://devxdevelopment.com/Unpacker [Extracting assets]
- https://github.com/AssetRipper/AssetRipper [Extracting assets]
- https://github.com/Perfare/AssetStudio [Extracting assets]
- https://github.com/axhlzy/Il2CppHookScripts [Il2Cpp Hook Scripts]
- https://github.com/gmh5225/Il2Cpp-HookScripts [Il2Cpp/Mono Hook Scripts]
- https://github.com/BataBo/ACEPatcher [.NET Patcher]
- A tool translate a apk file to common android project and support so hook include il2cpp c++ scaffolding
- https://github.com/xxzzddxzd/unitySpeedTools [IOS Speed Tools]
- https://github.com/gmh5225/il2cpp-finder [Il2Cpp Finder]
- https://github.com/gmh5225/frida-il2cpp-datacollector [Il2Cpp datacollector for Android/IOS]
- https://github.com/BepInEx/BepInEx [plugin/modding framework]
- https://github.com/gmh5225/IL22CPP [ReMake of Il2cpp internal reflection system in C++]
- https://github.com/sunnamed434/UnityVulnerableEntryPoint [Looks for a vulnerable entry point]
- https://github.com/Azvanzed/MatScan [A multi-threaded rust material scanner]
- https://github.com/vfsfitvnm/frida-il2cpp-bridge [Frida dump Il2Cpp]
- https://github.com/issuimo/UnityResolve.hpp [Unity cheat framwork]
- https://github.com/ByNameModding/BNM-Android [Modding il2cpp games]
- https://github.com/SsageParuders/CheatUnityGames [Unity cheat framwork]
- https://github.com/sanqiuu/AndroidCheatTemplate [Unity cheat framwork]
Game Engine Explorer:Source
- https://github.com/anarh1st47/Source2Dumps [Dump]
- https://github.com/CallumCVM/ValveGen [SDK Generator]
- https://github.com/praydog/Source2Gen [SDK Generator]
- https://github.com/neverlosecc/source2gen [SDK Generator]
- https://github.com/keowu/sourceengineexplorer [Explorer]
- https://github.com/neverlosecc/source2sdk
Explore UWP
- https://github.com/Wunkolo/UWPDumper
- https://github.com/Francesco149/uwpinject [dll injector for uwp apps]
- https://github.com/Francesco149/uwpspy [dll that hooks uwp interfaces]
Explore AntiCheat System:VAC
- https://github.com/danielkrupinski/VAC-Bypass-Loader
- https://github.com/danielkrupinski/vac-hooks
- https://github.com/mdilai/Shtreeba [Injector]
- https://github.com/zyhp/vac3_inhibitor
- https://github.com/krispybyte/Vook [VAC hook]
- https://github.com/ioncodes/vacation3-emu [VAC3 module emulator]
- https://github.com/altoid29/VACDumper [Dump]
- https://github.com/x1tan/vac3-dumper [Dump]
- https://github.com/nevioo1337/VAC-ModuleDumper [Dump]
- https://github.com/Jackbail4/VAC-Bypass
- https://github.com/n00bes/PreventVAC
- https://github.com/b1scoito/cozinha_loader [Injector]
- https://github.com/shuruk421/VACKeyRetrieval [Retrieves VAC module ice encryption key]
- https://github.com/RenardDev/DumpVAC [PoC to disable VAC and dump modules with automatic decryption]
- https://github.com/crvvdev/vac-bypass-kernel [Fully working kernel-mode VAC bypass]
Explore AntiCheat System:EAC
- https://github.com/thesecretclub/CVEAC-2020 [Integrity Checks]
- https://github.com/Schnocker/EAC_dbp [Debug]
- https://github.com/Compiled-Code/eac-mapper [Eac Mapper]
- https://github.com/eballoon/mmcopymemory [旁路mcopymemory]
- https://github.com/gmh5225/EAC-Kernel-Packet-Fucker [Packet Fucker]
- https://github.com/gmh5225/EAC-HydraHook [Packet Fucker]
- https://github.com/woomy144/EazyAntiCheatSRC [Reversed Source]
- https://github.com/chaeyk/eac-leak [EAC sdk's memory leak]
- https://github.com/gmh5225/EAC [SDK]
- https://github.com/ksoju/Eac-Bypass
- https://github.com/EBalloon/EasyAntiCheat-SRC
- https://github.com/gmh5225/EAC-EasyAntiCheat-Src-1
- https://www.unknowncheats.me/forum/anti-cheat-bypass/458928-ecs-maskable-interrupp-callback.html [nmi]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/464943-ecc-nmi-bypass-callbacks.html [nmi旁路]
- https://github.com/CheeZeDark/EasyAntiCheat-Reversing
- https://github.com/sinclairq/hiechephy-eacc [infirntity檢查]
- https://github.com/rat431/eacc_emu [簡單易於anticheat x64仿真器]
- https://github.com/xBrunoMedeiros/eac-overlay [EAC Overlay]
- https://github.com/gmh5225/ce-EasyAntiCheat-Bypass [UD CE]
- https://github.com/ioncodes/pooldump [提取EACS ManualMaps中的DLL中]
- https://github.com/gmh5225/EAC-VmCheck.asm [Virtual machine checking]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/561479-eacs-instrumentation-callback-bypass.html
- https://github.com/gmh5225/Eac-Injector-Driver [Injector]
- https://github.com/gmh5225/EAC-EasyAntiCheatMemorySig [Memory sig maker]
- https://github.com/gmh5225/EAC-shellcode-1 [Shellcode]
- https://github.com/gmh5225/EAC-Driver-UD-for-now [Sample]
- https://github.com/lguilhermee/EAC-Extractor-Utility [Decrypt and Extract the files from the EAC]
- https://advancedvectorextensions.github.io/posts/easyanticheat-eprocess-emulation [EProcess Emulation]
- https://advancedvectorextensions.github.io/posts/easyanticheat-cr3-protection [CR3 Protection]
- https://github.com/Sinclairq/hierarchy-eac [Bypassing self-integrity]
- https://github.com/SamuelTulach/eac_cr3_shuffle [Bypassing CR3 protection]
- https://github.com/Robert01337/Bypassing-EasyAntiCheat-Integrity-check [Bypassing integrity check]
- https://github.com/CamxxCore/EasyAntiCheat-Emulator [EAC Emulator]
- https://github.com/Azvanzed/EAC-Runtime-Extractor [Extracts eac's driver at runtime without it touching the disk]
- https://gist.github.com/gmh5225/b89938f55bcb65637168f88a433c3d4d [Skip EAC thread detection]
- https://github.com/kprprivate/EAC-CR3-BYPASS [A simple UM + KM example of how to bypass EAC CR3]
Explore AntiCheat System:BE
- https://github.com/Schnocker/NoEye
- https://github.com/ZoondEngine/NoBastian_v2 [Elevating Handle By LSASS]
- https://github.com/haram/splendid_implanter
- https://github.com/HadockKali/battleye-user-mode-bypass [SetWindowsHookExW]
- https://github.com/unreaIuser/BE-Emulator
- https://github.com/masterpastaa/BattlEye-Handler-BYPASS
- https://github.com/dllcrt0/battleye-decryption
- https://github.com/dllcrt0/bedaisy-reversal
- https://github.com/dllcrt0/battleye-shellcode [shellcode]
- https://github.com/gmh5225/BE-BattlEye_shellcode [shellcode]
- https://github.com/compiled-code/be-injector [攻擊牛]
- https://github.com/Aki2k/BEDaisy
- https://github.com/Luohuayu/BadEye
- https://github.com/zouxianyu/BlindEye [Packet Fucker]
- https://github.com/huoji120/goodeye
- https://github.com/LilPidgey/BEClient
- https://github.com/lguilhermee/Battleye-Shellcode-Dumper [BEClient2.dll Dumper]
- https://github.com/es3n1n/be-shellcode-tester [BattlEye shellcodes tester]
- https://github.com/steffalon/battleye-rust [BattlEye RCON UDP connection]
- https://github.com/Hypercall/FakeEye [Emulator]
- https://github.com/mexploitui/FakeEye [Emulator]
- https://github.com/tr1xxx/battleye-region-walking
- https://github.com/SurgeGotTappedAgain/Pink-Eye
- https://github.com/r4yven/beservice_intcallbacks [儀器回調]
- https://github.com/crtdll/bedaisy-bypass [BEDaisy.sys report bypass]
Explore AntiCheat System:EQU8
- https://blog.back.engineering/12/08/2021
- https://github.com/kkent030315/EQU8-PoC
- https://github.com/hotline1337/equ8_bypass
Explore AntiCheat System:Ricochet
- https://github.com/weak1337/ricochet_deobfuscator
- https://github.com/gmh5225/AurumRE
- https://github.com/gmh5225/ricochet-disabler
Explore AntiCheat System:RIOT
- https://github.com/Nuxar1/DecryptionDumper [Dump]
- https://github.com/lil-skies/val-exception handler [zwraiseexception dump]
- https://github.com/gmh5225/Dump-val-exception-handler [RtlpCallVectoredHandlers Dump]
- https://github.com/AdvancedVectorExtensions/VanguardImportResolver [Resolve vgk's protected imports]
- https://github.com/armvirus/VanguardTrace [Decrypting and intercepting encrypted imports of Vanguards Kernel Driver]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/578829-unveiling-unseen-vanguards-guarded-regions.html [CR3 Protection]
- https://github.com/gmh5225/vgk-illegal-pf-logger [VGK's illegal PF]
- https://github.com/zer0condition/KernelSnippets/blob/main/VGK_SwapContextHk.h [VGK's SwapContextHk]
Explore AntiCheat System:XignCode
- https://github.com/Skengdo/XignCode-Dump
- https://github.com/st4ckh0und/XignCode3-bypass-alternative
- https://github.com/st4ckh0und/XignCode3-bypass
Explore AntiCheat System:ACE
- https://github.com/H3d9/sguard_limit
- https://github.com/rogxo/ReadPhys
Explore AntiCheat System:G-Presto
- https://github.com/ARandomPerson7/G-Presto-Anti-Cheat-Reverse-Engineered/blob/main/Main.cpp
Explore AntiCheat System:NeacSafe
- https://github.com/gmh5225/NeacSafe-Analysis
Explore AntiCheat System:BadlionAnticheat
- https://github.com/KiFilterFiberContext/BadlionLogger
Explore AntiCheat System:Byfron
- https://byfron.com/
- https://www.unknowncheats.me/forum/anti-cheat-bypass/505486-byfron-tech-anti-cheat-released.html
- https://gist.github.com/gmh5225/cbe40345a9400b01329e025478ffb826 [hash]
- https://github.com/EnrickMartins/byfron-bypass
Explore AntiCheat System:NGS
- https://github.com/st4ckh0und/NexonGameSecurity-bypass
- https://github.com/st4ckh0und/NexonGameSecurity-bypass-alternative
- https://github.com/st4ckh0und/NexonGameSecurity-bypass-wow64
Explore AntiCheat System:FACEIT
- https://github.com/ekknod/EC_PRO-LAN
Explore AntiCheat System:CS2
- https://github.com/danielkrupinski/cs2-anticheat
Game:MapleStory
- https://forum.ragezone.com/threads/getting-packet-structures-opcodes-using-ida.792436/ [Packet]
- https://github.com/Bratah123/SpiritIDAPlugin [IDA-Plugin]
- https://github.com/icelemon1314/mapleLemon [Private Server-CMS-027]
- https://github.com/ellermister/MapleStory [Private Server-CMS-079]
- https://github.com/mrzhqiang/ms079 [Private Server-CMS-079]
- https://github.com/unsafeblackcat/MapleStoryEx [Private Server-CMS-079]
- https://github.com/gmh5225/maplestory-v83MaplestoryCPP [Private Server-GMS-083 C++]
- https://github.com/Fraysa/Destiny [Private Server-GMS-083 C#]
- https://github.com/Bratah123/ElectronMS [Private Server-KMS-316]
- https://github.com/reanox/MapleStory-v113-Server-Eimulator [Private Server-TMS-113]
- https://github.com/izarooni/MapleEzorsia [v83 edits for creating a custom resolution client]
- https://github.com/Bratah123/BattleAnalysis176 [Battle Analysis]
- https://github.com/johnsonjason/MapleStoryBuildFramework [AntiCheat]
- https://github.com/Noosh404/Maplestory-V179-Cheat-Engine [V179 CT]
- https://github.com/gmh5225/MapleStory-HeavenClient [Heaven Client]
- https://github.com/Inndy/TWMS-Hacking-Data [TMS CT]
- https://github.com/Inndy/MSDoggy [TMS Old Hack]
- https://github.com/PrinceFroggy/MSB [GMS Old Hack 128-140]
- https://github.com/PrinceFroggy/MSC [GMS Bot]
- https://github.com/v3921358/Rebirth [Private Server-GMS-095 C#]
- https://github.com/MapleStoryGameHack/mnwvs196 [Private Server-TMS-196]
- https://github.com/Maxcloud/MapleResearch [GMS-095 Client Analysis]
- https://github.com/neeerp/RustMS [Private Server-Rust]
- https://github.com/Kagamia/WzComparerR2 [Maplestory online Extractor]
- Generate machine learning object detection samples from Maplestory in different formats
- https://github.com/Elem8100/MapleStory-GM-Client [Offline MapleStory Client Emulator]
- https://github.com/gmh5225/maplestory-packer-ModPacker [MapleStory Wolrds .mod file packing/unpacking tools]
- https://github.com/Riremito/JMSv186 [JMS v186]
- https://github.com/ryantpayton/MapleStory-Client [HeavenMS Client]
- https://github.com/ryantpayton/MapleStory-Server [HeavenMS Server]
- https://github.com/YohananTzeviyah/LibreMaple-Client [LibreMaple Client]
- https://github.com/speedyHKjournalist/MapleServerAndroid [GMS 083 server on Android]
- https://github.com/Bratah123/ElectronMS [Private Server-KMS-316]
- https://github.com/SoulGirlJP/AzureV316 [Private Server-KMS-316]
- https://github.com/Elem8100/MapleNecrocer [MapleStory Client Emulator]
Game:Minecraft
- A minecraft server backend written in c++
Game:Sword With Sauce
- https://github.com/1hAck-0/UE4-Cheat-Source-Code
Game:Gunfire Reborn
- https://github.com/shalzuth/AutoGunfireReborn
Game:Fall Guys
- https://github.com/shalzuth/FallGuysSharp
- https://github.com/ioncodes/FallGuys
- https://github.com/aci1337/Flying-Guys-fully-modified
- https://github.com/FarmEquipment69/FlyingGuys
Game:Remnant
- https://github.com/shalzuth/RemnantESP
Game:LostArk
- https://github.com/shalzuth/LostArkDumper
- https://github.com/shalzuth/LostArkLogger
- https://github.com/realrespecter/LOST-ARK-SDK
- https://github.com/cpz/Lost-Ark-SDK
- https://github.com/cpz/LostArk
Game:Battlerite
- https://github.com/shalzuth/BattleriteBot
Game:CrossFire
- https://github.com/crvvdev/titancf
- https://github.com/serjam/cfclap
Game:TGame
- https://github.com/3tnet/nzPerspective [D3D9]
Game:LOL
- https://github.com/LeagueSharp
- https://github.com/SwipeDan/LeagueSharp
- https://github.com/ensoulsharp-io
- https://ferrisbot.com/ferrisaio
- https://github.com/SwipeDan/EloBuddy-Addons
- https://github.com/shalzuth/LeagueSharp
- https://github.com/shalzuth/LoLClient
- https://github.com/RyukOP/L-Assemblies
- https://github.com/korllan/LeagueSharp.Loader
- https://github.com/R3nzTheCodeGOD/R3nzSkin [Skin]
- https://github.com/R3nzTheCodeGOD/R3nzSkinTFT [Skin]
- https://github.com/B3akers/LeagueSkinChanger [Skin]
- https://github.com/real-web-world/hh-lol-prophet
- https://github.com/Nuxar1/DecryptionDumper [Dump]
- https://github.com/tarekwiz/LeagueDumper [Dump]
- https://github.com/tarekwiz/League-Unpacker [Dump]
- https://github.com/0x6461726B/lol-offset-dumper [Dump]
- https://github.com/LeaguePrank/LeagueTeamBoost
- https://github.com/LeagueSandbox
- https://github.com/MythicManiac/lol-unpackman
- A bran-new League of Legends assistant software, a replacement for WeGame
- https://github.com/orkido/LViewLoL [Python based scripting platform]
- https://github.com/KebsCS/KBotExt [LCU]
- https://github.com/botkalista/ayaya-league-external [Nodejs based scripting platform]
- https://github.com/jfd02/TFT-OCR-BOT [TFT]
- https://github.com/sooqua/VanderLeague [Hypervisor-assisted]
- https://github.com/KebsCS/League-DirectX11-Internal [Internal]
- https://github.com/sr-henry/league-base [External]
Game:NARAKA
- https://www.unknowncheats.me/forum/other-fps-games/490052-naraka-bladepoint-reversal-structs-offsets.html
- https://github.com/xkp95175333/DummyDlls_NARAKA_1_9_21 [Dump]
- https://github.com/Rythorndoran/Naraka-Hack
Game:Thetan
- https://github.com/xkp95175333/Thetan_ArenaSDK
遊戲:dota2
- https://github.com/ikhsanprasetyo/dota2dumped [Offset dumper]
- https://github.com/skrixx68/Dota2-Overlay-2.0
- https://github.com/gmh5225/Dota2-Overlay-OffsetUpdater
- https://github.com/interception-team/dota-cheat
- https://github.com/lwss/mcdota [linux]
- https://github.com/ExistedGit/Dota2Cheat
遊戲:哇
- https://github.com/helloobaby/wow-IAT-fix
- https://github.com/namreeb/dumpwow
- https://github.com/adde88/WoWDumpFix
- https://github.com/xakepru/x14.08-coverstory-blizzard
- https://github.com/fail46/ohack [魔獸世界的開放式攻擊]
- https://github.com/adde88/SkyEngine [Wow Lua Unlocker]
- https://github.com/gmh5225/WOW-WowAutoFishing [Auto Fishing]
Game:Warcraft III
- https://github.com/stijnherfst/HiveWE [editor]
Game:Half-Life 2
- https://github.com/codereversing/hl2aimbot
- https://github.com/codereversing/hl2esp
Game:CS1.6
- https://github.com/k4ne1337/hpp-hack
- https://github.com/BloodSharp/CSHackCreator-2-Demo
- https://github.com/oxiKKK/oxware
- https://github.com/execnone/simple-cs-16-multihack
- https://github.com/bit-paper/sakura
- https://github.com/eversinc33/1.6_C2 [C2]
Game:CSGO
- https://github.com/csgohacks/master-guide [Guide]
- https://github.com/Akandesh/blazedumper [Offset]
- https://github.com/frk1/hazedumper [Offset]
- https://github.com/KittenPopo/csgo-offsets [Offset]
- https://github.com/ofDataa/offsets [Offset]
- https://github.com/Akandesh/csgo_auto_dumper [Auto Dump]
- https://github.com/dretax/GarHal_CSGO
- https://github.com/danielkrupinski/Osiris
- https://github.com/danielkrupinski/GOESP [Cross-platform]
- https://github.com/danielkrupinski/Anubis
- https://github.com/s3pt3mb3r/Dainsleif
- https://github.com/lagcomp/csgo_sdk
- https://github.com/felix-rs/csgo-sdk [SDK for Rust]
- https://github.com/ekknod/csf_w [Win SDK]
- https://github.com/ekknod/csf [Linux SDK]
- https://github.com/Speedi13/ROP-COMPILER
- https://github.com/AimTuxOfficial/AimTux [Linux]
- https://github.com/seksea/gamesneeze [Linux]
- https://github.com/otvv/csgo-linux-cheat-sdk [Linux]
- https://github.com/EternityX/DEADCELL-CSGO
- https://github.com/nbqofficial/kernel-csgo
- https://github.com/HeathHowren/CSGO-Cheats
- https://github.com/Kruziikrel1/CSGO-FindMDL [Model Changer]
- https://github.com/ekknod/nv_v2 [Sound ESP]
- https://github.com/DerGrosse-prog/Improved-CSGO_Simple
- https://github.com/0TheSpy/SpyExternal1337hax [External]
- https://github.com/0TheSpy/Seaside [Internal]
- https://github.com/whereisr0da/Lumina-Cheat [Internal]
- https://github.com/nbqofficial/norsefire [Driver + Mouse Emulation]
- https://github.com/boltgolt/boltobserv [Radar]
- https://github.com/worse-666/csgo_external_ahk_hack [External]
- https://github.com/ch4ncellor/CSGO-P2C-Dumper [Dump]
- https://github.com/Akatsyk/2k17-club
- https://github.com/flowxrc/csgo-xenforo-loader
- https://github.com/ALittlePatate/ezfrags
- https://github.com/Neaxic/CSGO-MAIN-INTERNAL
- https://github.com/W1lliam1337/digital-sdk
- https://github.com/sneakyevilSK/CSGO_BacktrackPatch [Backtrack Patch]
- https://github.com/NullTerminatorr/NullBase [External]
- https://github.com/krxdev-kaan/AqHax-CSGO
- https://github.com/slack69/csgo-dma-overlay [DMA]
- https://github.com/rrpvm/csgo-external-cheat
- https://github.com/petercunha/Pine [Neural Network]
- https://github.com/Bartis1313/csgo
- https://github.com/NullHooks/NullHooks [Internal]
- https://github.com/Skarbo/CSGOCrosshair [Crosshair Generator]
- https://github.com/ekknod/G37OBS [obs-studio plugin for csgo]
- https://github.com/Sentient111/Csgo-Full-kernel [Running from kernelmode]
- https://github.com/razixNew/CompiledProtection [Cheat Compiler]
- https://github.com/ekknod/EC
- https://github.com/soyware/heck_csgo_external [External]
- https://github.com/martinjanas/Sensum [Internal]
- https://github.com/cazzwastaken/kakhack [Internal]
- https://github.com/binkynz/cstrike-hack
- https://github.com/R4YVEN/raybot-zero [Kernel-mode]
- https://github.com/gmh5225/CSGO-Loader [Loader]
- https://github.com/gmh5225/CSGO-NIXWARE-CSGO [Nixware]
- https://github.com/designer1337/csgo-cheat-base [Internal]
- https://github.com/yourmnbbn/tiny-csgo-client [Tiny csgo client for connecting dedicated server]
- https://github.com/click4dylan/CSGO_AnimationCode_Reversed [CSGO animation code]
- https://github.com/spirthack/CSGOSimple [Internal]
- https://github.com/ViddeBoiiii/CSGO-Ormbunke-x86 [Imgui Menu]
- https://github.com/MavenCoding157/legit-csgo-cheat-menu [Menu]
- https://github.com/skep1337/autismware [HvH]
- https://github.com/emilyinure/solace-csgo [Internal]
- https://github.com/bruhmoment21/csgo-sdk-improved [Internal]
- https://github.com/IVBecy/cartmanv2 [Internal]
- https://github.com/gmh5225/CSGO-aw-v5.1.13 [aw-v5.1.13]
- https://github.com/ricencheese/csgo-bot
- https://github.com/forceinline/csgo-external-esp [External]
- https://github.com/VladislavAlpatov/avhook
- https://github.com/si1kyyy/csgo_cheat_external [External]
- https://github.com/latuh/nebulite-external [External]
- https://github.com/lstrsrt/csgo_internal_base [Internal]
- https://github.com/404Kurama/Astra [External]
- https://github.com/gmh5225/CSGO-Alphen
- https://github.com/Enzo0721/ExternalCheatV3 [External]
- https://github.com/SteamDatabase/Protobufs/tree/master/csgo [Protobuf]
- https://github.com/kyojig/csgo_kns [Internal]
- https://github.com/M3351AN/saphire [Internal]
- https://github.com/VitorMob/GHInterfacesCSGO [Internal]
- https://github.com/superyu1337/memcs [External]
- https://github.com/rabbitfishy/sdk [SDK]
- https://github.com/bloesway/csgo_sdk [SDK]
- https://github.com/DeiVid-12/SmKernel-CSGO [Driver]
Game:CS2
- https://github.com/danielkrupinski/Osiris
- https://github.com/ro0ti/CS2-Offsets [Offset]
- https://github.com/sezzyaep/CS2-OFFSETS [Offset]
- https://github.com/Salvatore-Als/cs2-signature-list [Signature]
- https://github.com/bruhmoment21/cs2-sdk [SDK]
- https://github.com/Omn1z/Counter-Strike2-SDK [SDK]
- https://github.com/0wk/cs2-sdk [SDK]
- https://github.com/gmh5225/CS2-SDK-Source2Gen [SDK]
- https://github.com/FrySimpl3/SDK_CS2 [SDK]
- https://github.com/nikkacs/cs2_sdk [SDK]
- https://github.com/NotOfficer/cs2-sdk [SDK]
- https://github.com/a2x/cs2-dumper [Dump]
- https://github.com/imnotdatguy/csgo2-cheat
- https://github.com/papstuc/counterstrike2
- https://github.com/nezu-cc/BakaWare4
- https://github.com/gmh5225/cs2-fov-changer [FOV changer]
- https://github.com/clauadv/cs2_webradar [Radar]
- https://github.com/MoZiHao/CS2_DMA_Radar [DMA Radar]
- https://github.com/MoZiHao/CS2_DMA_Extrnal [DMA External]
- https://github.com/gmh5225/vscript_lua51 [VScript]
- https://github.com/gmh5225/cs2_things [VScript]
- https://github.com/IMXNOOBX/cs2-external-esp [External]
- https://github.com/UnnamedZ03/CS2-external-base [External]
- https://github.com/Tokyodidit/cs2External [External]
- https://github.com/TKazer/CS2_External [External]
- https://github.com/Valthrun/Valthrun [External]
- https://github.com/Zckyy/CS2-External [External]
- https://github.com/sFIsAnExpert/CS2-External-Cheat [External]
- https://github.com/gmh5225/tim_apple [External]
- https://github.com/kristofhracza/tim_apple [External]
- https://github.com/gmh5225/CS2-Cheat [External]
- https://github.com/Half-People/HPCS2 [External]
- https://github.com/gmh5225/CS2-External-1 [External]
- https://github.com/CowNowK/AimStarCS2 [External]
- https://github.com/Fr0go1/Aeonix-Cs2 [External]
- https://github.com/xvorost/CS-2-Glow [External]
- https://github.com/yinleiCoder/cs2-cheat-cpp [External]
- https://github.com/ByteCorum/DragonBurn [External]
- https://github.com/KisSsArt/CS2-Cheat-Base [Internal]
- https://github.com/redbg/CS2-Internal [Internal]
- https://github.com/Elsie-Kgafela/CS2-Cheat-Base [Internal]
- https://github.com/chaycee/CS2Internal [Internal]
- https://github.com/Elsie-Kgafela/csgo2-cheat [Internal]
- https://github.com/vortex1573/Aurora [Internal]
- https://github.com/W1lliam1337/cstrike2-hack [Rust-based internal]
- https://github.com/eden13378/CS2-DMA-Cheat [DMA]
- https://github.com/spookykokojunge/CS2-Dma-Radar [DMA]
- https://github.com/atombottle/cs2_kvm_dma [KVM]
Game:Assault Cube
- https://github.com/gmh5225/external-esp-hack-assaultcube [GDI overlay]
- https://github.com/SkarSys/AssaultCubeCheat
- https://github.com/201580ag/AssaultCube_Cheat
Game:Valorant
- https://github.com/apekros/valorant_offsets [Offset]
- https://github.com/10HEAD/ValorantOffsets [Offset]
- https://github.com/ofDataa/offsets [Offset]
- https://github.com/gmh5225/valorant-externals [Offset]
- https://github.com/GLX-ILLUSION/valorant-offsets-autoupdater [Offset]
- https://github.com/Chuan212/ValorantOffsets-China-version [Offset]
- https://github.com/hadevn/Valorant-SDK-2024 [SDK]
- https://github.com/skechtew/valorant-gui-imgui-remake [GUI]
- https://github.com/reahly/valorant-internal
- https://github.com/gmh5225/Zenti-Valorant-Cheat-Hack-Internal-Spoofer-Driver-Injector-Protector-Auth
- https://github.com/gmh5225/Valorant-Hack-Esp-Aimbot-Driver-Injector-With-Spoofer-Temporary
- https://github.com/xehn1337/valorant-dumper [dump]
- https://github.com/gmh5225/valorant-dumper-tool [dump]
- https://github.com/lil-skies/val-exception handler [zwraiseexception dump]
- https://github.com/gmh5225/Valorant-Esp-Aimbot-Hack
- https://github.com/frankelitoc/ue4-c- [外部]
- https://github.com/aryuinka/valorant-cheat-external [外部]
- https://github.com/gmh5225/Valorant-Cheat
- 迭代和解密fnamepool-> valort上的條目
- https://github.com/gmh5225/Valorant-External-1
- https://github.com/chase1803/ucmiraka-valorantexternal [ntusergetPoInterpropriparyId]
- https://github.com/gmh5225/Valorant-CheatExternal
- https://github.com/weedeej/ValorantCC [Crosshair Setting]
- https://github.com/gmh5225/Internal-Valorant-Cheat
- https://github.com/gmh5225/VALORANT-HACK-ESP-AIMBOT-SKINCHANGER
- https://github.com/MauhTon/valorant-esp-hack-with-driver
- https://github.com/MauhTon/Valorant-Aimbot-Bypass
- https://github.com/zeroday-z/CyberAntLoader
- https://github.com/gmh5225/Valorant.External
- https://github.com/R7flex/valorant-internal-base [Internal]
- https://github.com/gmh5225/VALORANT-HACK-ESP-AIMBOT-SKINCHANGER-SOURCE [Internal]
- https://github.com/gmh5225/Valorant-External-Source [External]
- https://github.com/gmh5225/Valorant-cheat-internal [Internal]
- https://github.com/gmh5225/Valorant-Esp-Aimbot-Cheat-Hack [External]
- https://github.com/94q/Valorant-Internal [Internal]
- https://github.com/DX9Paster/Valorant-External-P2C-Leaked [External]
- https://github.com/kali11211/valorant-internal-cheat [Internal]
- https://github.com/234945/valo-driver [External]
- https://github.com/kali11211/valorant-internal-cheat [Internal]
- https://github.com/gmh5225/ValorantCheatExternal [External]
Game:VEILED EXPERTS
- https://github.com/EBalloon/VEILED-EXPERTS-SDK
- https://github.com/LagradOst/ProjectD-Win64-Shipping
- https://github.com/Da3kL3o/VeiledExpertsSDK
- https://github.com/percpopper/VX-It [Decrypt]
Game:COD1
- https://github.com/attilathedud/CoD_Hacks
Game:COD7
- https://github.com/nice-sprite/COD7-Tools
Game:COD Black Ops 2
- https://github.com/momo5502/t7-linker [100% accurate Black Ops 2 FastFile linker]
Game:COD Black Ops 3
- https://github.com/gmh5225/COD-boiii [Reverse engineering and analysis]
Game:COD Warzone
- https://github.com/YMY1666527646/Call-of-Duty-Warzone-MW-HACK-ESP-AIMBOT
- https://github.com/serjam/mwclap
- https://github.com/NMan1/external-warzone-cheat
- https://github.com/NMan1/warzone-internal
- https://github.com/gmh5225/Call-Of-Duty-Warzone-Hack-Esp-Slient-Aimbot-Internal-Unlock-ALL
- https://github.com/gmh5225/Call-Of-Duty-Vanguard-Hack-Esp-AImbot-Unlock-All
- https://github.com/gmh5225/Warzone-internal-Cheat
- https://github.com/SpiroHappy/Warzone-MW-Internal
- https://github.com/gmh5225/-Modern-Warfare-Warzone-Cheat
Game:CODM
- https://github.com/Poko-Apps/CodMDumper [il2cpp dump]
- https://github.com/gmh5225/CODM-ESP-Aimbot-Mod-Menu [ESP]
Game:Battlefield 1
- https://github.com/Zakaria-Master/BF1-ESP-AND-AIMBOT
- https://github.com/younasiqw/BattleField-1-Internal
Game:Battlefield 4
- https://github.com/Zakaria-Master/BF4-Internal-overlay
Game:Battlefield 2042
- https://github.com/Skengdo/battlefield-2042-internal-sdk
Game:Apex Legends
- https://github.com/dhanax26/Apex-Legends-Offset-Dumper [Offset]
- https://github.com/ofDataa/offsets [Offset]
- https://github.com/dword64/Apex-Legends-SDK-Remaster
- https://github.com/hooksteroid/ApexD3D_External
- https://github.com/NMan1/apex-legends-cheat
- https://github.com/gmh5225/Apex-SIMPLE-AIMBOT-GLOW-APEX
- https://github.com/TheCruZ/Direct-EFI-Apex-Cheat
- https://github.com/Astronaut00/apex-external
- https://github.com/YMY1666527646/Phoenix-Valorant-Cheat
- https://github.com/CasualX/apexbot
- https://github.com/TheCruZ/Apex_Legends_Driver_Cheat
- https://github.com/Keyzp1337/Fortnite
- https://github.com/Zurek0x/NuremX [AI]
- https://github.com/hadevn/apex_full_cheat
- https://github.com/gmh5225/Apex-ApexCheeseTest
- https://github.com/RavenOfTime/Apex-Legends-Esp
- https://github.com/gmh5225/Apex-ApexCheat
- https://github.com/Zakaria-Master/Apex_ESP_Old_Project
- https://github.com/cheatingwitdacode/apex-cheating
- https://github.com/LWSS/Ape-ex-Abominations [QEMU]
- https://github.com/Y33Tcoder/EzApexDMAAimbot [KVM]
- https://github.com/gmh5225/Apex-CHEAT-FIXED
- https://github.com/gmh5225/apex_legends_sdk
- https://github.com/ekknod/apex_linux [linux]
- https://github.com/XRadius/project-tanya [linux]
- https://github.com/EquinoxAlpha/ayypex [linux]
- https://github.com/KaylinOwO/Project-Branthium
- https://github.com/gmh5225/Apex-Legends-External-Esp-Aimbot-Skinchanger
- https://github.com/Neurosisccc/Apex-ItemGlow [Item glow]
- https://github.com/BaconToaster/UC-Apex-Remastered
- https://github.com/NekoRem/apex-external [External]
- https://github.com/M1fisto/nullptr-apex-external [External]
- https://github.com/3nolan5/R5Apex-UserMode [External]
- https://github.com/NaiJii/Apex-Mizu-Base [Internal]
- https://github.com/boowampp/ApexDmaCheatUpdated [DMA]
Game:Fortnite
- https://github.com/kem0x/FortKit [Dump]
- https://github.com/ofDataa/offsets [Offset]
- https://github.com/Trydos/fortnite-offsets [Offset]
- https://github.com/masterpastaa/AutoOffsets [Offset]
- https://github.com/Zetolac/FortniteOffsetsAndSigs [Offset]
- https://github.com/Android1337/Fortnite-Offsets [Offset]
- https://github.com/Luksiuss/FortniteSigsUpdatedEveryUpdate [Offset]
- https://github.com/gmh5225/Fortnite-SigsUpdatedEveryUpdate [Offset]
- https://github.com/gmh5225/fortnite-W2S-offset-Fortnite [Offset]
- https://github.com/plu1337/fortnite-offsets [Offset]
- https://github.com/gmh5225/Fortnite-Offset-dumper [Offset & Dump]
- https://github.com/plu1337/fortnite-virtual-offsets [Virtual Table Offsets]
- https://github.com/plu1337/fortnite-sigs [Signature]
- https://github.com/F0NDO/fortnite-sigs [Signature]
- https://github.com/plu1337/fortnite-exploits [Exploits]
- https://github.com/ReallReaper/Fortnite-Offsets-Sigs-and-more [Offset]
- https://github.com/Makk5/FortConsole
- https://github.com/gmh5225/Fortnite-Leak5
- https://github.com/Zetolac/FortniteExternalW2S
- https://github.com/gmh5225/Fortnite-Internal-Cheat-Fixed-and-Updated
- https://github.com/gmh5225/Fortnite-EFI-External [EFI]
- https://github.com/gmh5225/Fortnite-External-Cheat-WinSense-Leak
- https://github.com/jooola00/fortnite-cheat-source-internal
- https://github.com/YMY1666527646/Fortnite-Hack-Esp-Exploits-With-Menu
- https://github.com/YMY1666527646/nigusFN
- https://github.com/Sheeedsh78/Cheto-Fortnite-Source-External-EAC-BE-undetected
- https://github.com/CheaterRehab/GodFather-Fortnite-Cheat-Cracked
- https://github.com/Keyzp1337/Fortnite
- https://github.com/vk-nom/Basic-Fortnite-Cheat-Source-Internal
- https://github.com/PasterWolf/Fortnite-UD-External
- https://github.com/gmh5225/Fortnite-Esp-Aimbot-Exploits-Hwid-Spoofer-Cleaner-Hack-Cheat
- https://github.com/Waihbe/Fortnite-Cheat-LEAK
- https://github.com/zinx-YT/Fortnite-Fltokens-and-offsets
- https://github.com/gmh5225/VOLTO-EXTERNAL-SPOWAR-UD-EAC-BE-FORTNITE-EXTERNAL-CHEAT
- https://github.com/gmh5225/Serenity.gg-FN-and-Loader
- https://github.com/Waihbe/Fortnite-External-Cheat-Leak
- https://github.com/AlfredIU/Spoofer [HWID]
- https://github.com/pastor-ritz/ritz-amazing-fortnite-internal
- https://github.com/plu1337/Fortnite-Masterpasta-ihack-Source-Leak
- https://github.com/gmh5225/Fortnite-Evo.cc-Source-External-Cheat
- https://github.com/KeyzpOnTheFluxxx/Fortnite-External
- https://github.com/gmh5225/Apple-Lite-Fortnite-Cheat
- https://github.com/gmh5225/Fortnite-External-Cheat-Source-Code
- https://github.com/0dayatday0/BattleFN-cheat-analysis
- https://github.com/gmh5225/fortnite-internal-updated-ritz [Internal]
- https://github.com/JeanToBinks/Fortnite-Cheato-UD-EAC-BE
- https://github.com/gmh5225/BE-Forcer-Fortnite [BE forcer for fortnite]
- https://github.com/dx9paster/fortnite-external [外部]
- https://github.com/percpopper/Fortnite-CameraCachePOV
- https://github.com/percpopper/Fortnite-FNameEntry
- https://github.com/ritz-1337/fortnite-external-evo.gj [外部]
- https://github.com/simply-codes/fortnite-external-p2c [外部]
- https://github.com/zetolac/fortniteexternalexploits [外部漏洞]
- https://github.com/xetzzy/fortnite-external-source [外部]
- https://github.com/gmh5225/fortnite-triadz [外部]
- https://github.com/gmh5225/fortnite-external-5 [外部]
- https://github.com/dontcry361x/ritz-amazing-fortnite-internal-pood [internal]
- https://github.com/nurdalert/flirtnite [外部]
- https://github.com/JetBrains-CLion/Fortnite-3.5 [Internal]
- https://github.com/gmh5225/ZeroGui-Fortnite-Internal [Internal]
- https://github.com/gmh5225/Fortnite-VoyagerTF [Voyager]
- https://github.com/gmh5225/Fortnite-External-4 [External]
- https://github.com/lauralex/fn-dma-cheat [DMA]
Game:Bloodhunt
- https://github.com/ZZZ-Monster/bloodhunt_External
- https://github.com/PhysX1337/BloodHunt-v1.1
- https://github.com/gmh5225/blood-hunt
Game:Super People
- https://github.com/EBalloon/Super-People-sdk
- https://github.com/gmh5225/Super-People-Esp-Aimbot-Magic-Hack
- https://github.com/gmh5225/superpeople-client
Game:Splitgate
- https://github.com/percpopper/Splitgate-Internal
Game:PUBG
- https://github.com/owdata1/pubg-dumper [Dump]
- https://github.com/orange088/pubg_dump_offset [Offset]
- https://github.com/Skengdoo/pubg-external-cheat
- https://github.com/ajkhoury/pubg_internal
- https://github.com/iCollin/pubg-internal
- https://github.com/K-cazb/pubg-public
- https://github.com/gmh5225/PlayerUnknown-s-Battlegrounds-Pubg-Steam-Hack-Esp-Aimbot
- https://github.com/dot1991/lilypublic
- https://github.com/kurt2467/PUBG_Internal
- https://github.com/gmh5225/PUBG-DX
- https://github.com/gmh5225/PUBGSTAR
Game:PUBG Lite
- https://github.com/Zakaria-Master/Pubg-Lite-ESP
Game:PUBGM
- https://github.com/Zakaria-Master/pubgm_sdk_and_offsets [Offset]
- https://github.com/atulkunal999/pubg_mobile_memory_hacking
- https://github.com/Mood-Coding/pubgm_shitty_source
- https://github.com/gmh5225/PUBGM-PUBGPatcher
- https://github.com/Zakaria-Master/PUBGM1.6-DeadGame
- https://github.com/mut1234/BYPASS-PUBG-MOBILE-IMGUI
- https://github.com/busmanl30/LastIslandOfSurvival-iOSCheat-Source
- https://github.com/halloweeks/pubg-mobile-pak-extract [pak extracting tool]
- https://github.com/gmh5225/pubg_mobile_memory_hacking_examples
- https://github.com/Super-Cssdiv/ChinaPubg
- https://github.com/wantao1008hh/pubg
Game:Sausage Man
- https://github.com/gmh5225/AndroidCheatTemplate
Game:The finals
- https://github.com/gmh5225/the-finals-interior-cheat
Game:EFT
- https://github.com/patrickcjk/TOG [Offsets Generator]
- https://github.com/fcancelog/EftStreamedCheat
- https://github.com/Nou4r/pKernelInterface-EFT
- https://github.com/sailro/EscapeFromTarkov-Trainer
- https://github.com/vmwrite/tiny_eft
- https://github.com/CplNathan/Nathans-Tarkov-Radar-Public [Vmread + Radar]
- https://github.com/frankie-11/eft-external
- https://github.com/Splitx12/eft
- https://github.com/gmh5225/eft-internal
- https://github.com/gmh5225/EFT-Veil-EFT
- https://github.com/Qemu-Gang/Escape-from-TuxKov [QEMU]
- https://github.com/gmh5225/Comm-ImMiraclela
- https://github.com/krispybyte/Simple-EFT-Base
- https://github.com/bytemyass/EFTLeecher [DMA]
- https://github.com/gmh5225/eft-dma-radar-1 [DMA Radar]
- https://github.com/gmh5225/EFT-MonoEFT
- https://github.com/ZhaoKunqi/simple-eft-superman-training-bot
- https://github.com/gmh5225/EFT-NewTarkovCheatProject
Game:Arena Breakout Infinite
- https://github.com/cra0/UE426_ABInfinite-Win64-Shipping [SDK]
- https://github.com/Ke4ton/hardware_bypass [GPU check bypass]
Game:R6
- https://github.com/NMan1/Rainbow-Six-Cheat
- https://github.com/NMan1/OverflowR6V2
- https://github.com/NMan1/Internal-Rainbow-Six-Cheat-V3
- https://github.com/beans42/epic-r6-v9
- https://github.com/Kix48/R6Updater
- https://github.com/hooksteroid/R6Table_Internal
- https://github.com/JGonz1337/r6-internal
- https://github.com/SurgeGotTappedAgain/External-R6S-Cheat
- https://github.com/vctr74/R6-Internal-V3
- https://github.com/gmh5225/R6S-internal-Cheat
- https://github.com/gmh5225/Rainbow-Six-Siege-Rs6-External-Esp-Aimbot-Hack-Cheat
- https://github.com/gmh5225/Rainbow-6-Siege-Cheat
- https://github.com/rushzzz-max/r6-external [External]
- https://github.com/ArtemisDevGroup/Artemis [Internal]
- https://github.com/MuffinPanda/R6-Cheat-Dumper [External]
- https://github.com/Possbl/R6S-External-V2 [External]
- https://github.com/igromanru/R6-Chams-public [Chams]
Game:Overwatch
- https://github.com/blackhades00/PareidoliaTriggerbot [Triggerbot]
- https://github.com/OSNSON/Overwatch-1-cheat-source-.
- https://github.com/vmmcall/overwatch-iat-fixer [Overwatch IAT Fixer]
- https://github.com/Midi12/ow_unpack
- https://github.com/gmh5225/OW-Aeternum
- https://github.com/dword64/Ow-FOV [FOV]
遊戲:oftwatch2
- https://github.com/gmh5225/Overwatch2-colorbot-Cheats
- https://github.com/gmh5225/Overwatch-2-Cheat-Aimbot-Esp
- https://github.com/nismo1337/meowsense
- https://github.com/gmh5225/OW-outlines [通過牆壁向玩家展示]
- https://github.com/ZEROWyt/Overwatch-2-TOPE-EXTERNAL-CHEAT
- https://github.com/gmh5225/ow2-wardenrekter [仿真OW2 AC]
遊戲:聖騎士
- https://github.com/gmh5225/Paladins-Internal-Esp-Aimbot-Hack-Cheat-Hack
- https://github.com/gmh5225/Paladins-internal-Cheat
遊戲:Dayz
- https://github.com/zhitkur/DayZzz
- https://github.com/SurgeGotTappedAgain/External-Dayz-Cheat
- https://github.com/gmh5225/DayZ-Cheat
- https://github.com/JonathanEke/DayZ-Server-Battleye-Remover [Disable battleye]
Game:Rust
- https://github.com/Akandesh/rust-auto-dumper [Auto Dump]
- https://github.com/LabGuy94/OxideDumper [Auto Dump]
- https://github.com/NMan1/OverflowRust
- https://github.com/gmh5225/simple-rust-hack
- https://github.com/Facepunch-bot/rust-internal
- https://github.com/Facepunch-bot/Rust-External
- https://github.com/Facepunch-bot/Rico-Cheat-rust-external
- https://github.com/spyder1g/a-pasted-rust-script
- https://github.com/LordAbbot/Rust-External-Cheat
- https://github.com/ZentifyZ/Kors_lol [Internal]
- https://github.com/gmh5225/Rust-Internal [Internal]
- https://github.com/ZentifyZ/CRC32
- https://github.com/SteepCheat/Rust-Cheat-External
- https://github.com/krispybyte/Simple-Rust-Base
- https://github.com/vmwrite/sapphire
- https://github.com/Disline1337/Rust-Cheat-External-main
- https://github.com/gmh5225/Rust-RustInternal [Internal]
- https://github.com/gmh5225/rust-external-1 [External]
- https://github.com/gmh5225/Rust-External [External]
- https://github.com/gmh5225/Rust-ExternaL-and-Driver-AlienCheats [External]
- https://github.com/Rogue619Z/Rust-External-Source [External]
- https://github.com/gmh5225/immortal-rust
- https://github.com/IntelSDM/RustDMACheat [DMA]
Game:Arma3
- https://github.com/Skengdo/arma3-external-variable-manager
- https://github.com/R3voA3/3den-Enhanced [Mod Editor]
- https://github.com/tym32167/arma3beclient [BattlEye Tool]
Game:7 Days To Die
- https://github.com/IntelSDM/7DTD
Game:AVA
- https://github.com/boylin0/AVA-Hack
Game:Mordhau
- https://github.com/Skengdo/mordhau-simple-auto-block-cheat
Game:Smite [UE3]
- https://github.com/JackBro/SmiteESPAimbot
Game:POLYGON [UE5]
- https://github.com/gmh5225/POLYGON_UE5
Game:PalWorld [UE5]
- https://www.unknowncheats.me/forum/other-fps-games/620076-palworld-reversal-structs-offsets.html
- https://github.com/gmh5225/Palworld-SDK-Dump
- https://github.com/gmh5225/Palworld-Server-Modding
- https://github.com/gmh5225/PalWorld-ServerInjector
- https://github.com/gmh5225/PalWorld-NetCrack
- https://github.com/luciouskami/palworld_rcon [Server on Windows]
- https://github.com/luciouskami/palworld_rcon [Server on Windows]
- https://github.com/A1RM4X/HowTo-Palworld [Server on Linux]
- https://github.com/jammsen/docker-palworld-dedicated-server [Server based on Linux and Docker]
- https://github.com/VeroFess/PalWorld-Server-Unoffical-Fix [Server patch]
- https://github.com/NattKh/PalWorld-Tools [Mod Patcher]
- https://github.com/localcc/palworldmoddingkit [palworld的改裝套件]
- https://github.com/weizhking/palworldsaved [save]
- https://github.com/cheahjs/palworld-save-tools [Save]
- https://github.com/eternalwraith/paledit保存]
- https://github.com/dysoncheng/palworldsettinggenerator [設置Generator]
- https://github.com/hualuoo/palworld-helper [助手]
- https://github.com/shalzuth/palworldanticheat [anti Cheat]
- https://github.com/g91/palanticheat-poc [anti Cheat]
遊戲:Genshin Impact
- https://github.com/khang06/mhynot2
- https://github.com/khang06/genshinjumpfixer2 [Decode CFG]
- https://github.com/khang06/misc/tree/master/reversing/genshin [Decode CFG]
- https://github.com/DNLINYJ/Anti_miHoYo_Jcc_Obfuscate [Decode CFG By X64DBG]
- https://github.com/gmh5225/genshin-cheat
- https://github.com/Grasscutters/Grasscutter [Private Server]
- https://github.com/gmh5225/Genshin-Akebi-GC [Cheat]
- https://github.com/gmh5225/Akebi-Cheat-3.3 [Cheat]
- https://github.com/gmh5225/Genshin-GenshinData [Game Data]
- https://github.com/HolographicHat/YaeAchievement
- https://github.com/phonowell/genshin-impact-script [A sweet genshin impact script]
- https://github.com/KnsGoyoLV/GenshinImpact-Base
- https://github.com/360NENZ/Taiga74164-Akebi-GC
- https://github.com/Ev3nt/EasyPeasy-GC
- https://github.com/xTaiwanPingLord/GenshinDebuggerBypass
- https://github.com/gmh5225/Genshin-EasyPeasy-Bypass [Anti-Debug Bypass]
- https://github.com/ELJoOker2004/genshin-remove-banner
- https://github.com/Micah123321/AutoOpenCAK [Bypass tool]
- https://github.com/KillSKID/Genshin-Cheetos [Menu]
Game:Honkai Impact
- https://github.com/BuIlDaLiBlE/BetterHI3Launcher
- https://github.com/Z4ee/HI3-ACE-B
Game:Honkai Star Rail
- https://github.com/Z4ee/StarRail-S-GC
- https://github.com/Z4ee/StarRail-ACE-B
- https://github.com/aderfa/star_rail
- https://github.com/gmh5225/Pom-Pom
- https://github.com/LmeSzinc/StarRailCopilot [Script]
- https://github.com/CHNZYX/Auto_Simulated_Universe [Script]
Game:osu
- https://github.com/fs-c/maniac [External]
- https://github.com/Ciremun/freedom [difficulty changer & bot]
- https://github.com/gmh5225/osu-aac [ANTI ANTI CHEAT]
Game:EldenRing
- https://github.com/techiew/EldenRingMods [Mod]
- https://github.com/v-maxson/EldenRingLauncher [Launcher]
- https://github.com/Nordgaren/Elden-Ring-Debug-Tool [Debug tool for Elden Ring modding]
Game:Dark Souls
- https://github.com/igromanru/Dark-Souls-III-Cheat-Engine-Guide
Game:Sea Of Thieves
- https://github.com/ToxSylph/SeaOfChoros
Game:GTA III - Definitive Edition
- https://github.com/gmh5225/GTAIII-DE-GoldHook
Game:GTA5
- https://github.com/p0l3naruba/gtav-sourcecode-build-guide [gta v源代碼構建教程]
- https://github.com/gmh5225/gta-5-sigs-1.59 [offset]
- About Adds drag- to- resize functionality to the main GTA V window
- 盜竊自動V(PC)的開源作弊軟件
- https://github.com/Pocakking/BigBaseV2
- https://github.com/YimMenu/YimMenu
- https://github.com/seanghost117/spookimystic-gta-leak [菜單]
- https://github.com/Rimmuru/gta-source
- https://github.com/sydevteam/gta5view [viewer/editor]
- https://github.com/skarockoi/pHake [Mod Menu]
- https://github.com/camxxcore/extendedcamerasettings [擴展遊戲攝像機的功能]
- https://github.com/medusi/gta5cheat
- https://github.com/ssyatelandisi/gta5cheat_qt
Game:Geometry Dash
- https://github.com/reservedcloud/gd-internal
Game:8ball pool
- https://github.com/gmh5225/Alaa-8ball-pool-source-exposed
Game:Wizard101
- https://github.com/AmJayden/wizard101-spoofer [HWID]
Game:QQTang
- https://github.com/blackmaple/QQTangCheatEngine
Game:Chess
- https://github.com/LeelaChessZero/lc0 [Chess Engine]
- https://github.com/official-stockfish/Stockfish [Chess Engine]
Game:BLOCKPOST
- https://github.com/xo1337/BLOCKPOST-Cheat
Game:Witch It
- https://github.com/guttir14/CheatIt
Game:RO
- https://github.com/rAthenaCN/rAthenaCN
Game:PokemonGo
- https://github.com/Jumboperson/PokemonGoDumper
Game:L4D2
- https://github.com/Fox-Cult/L4D2-Cheat [Linux]
- https://github.com/Axactt/L4D2Basic
Game:mhxy
- https://github.com/gmh5225/mhxy_kernel
- https://github.com/gmh5225/mhxy
Game:Ironsight
- https://github.com/oluan/Lazysight
Game:Devour
- https://github.com/ALittlePatate/DevourClient
- https://github.com/BitCrackers/DevourMenu [Menu]
Game:Goose Goose Duck
- https://github.com/Liuhaixv/Goose_Goose_Duck_Hack
Game:Team Fortress 2
- https://github.com/gmh5225/teamfortress2_internal
- https://github.com/BlueSnoopT/Cunthook [linux]
- https://github.com/Fedoraware/Fedoraware
反作弊
指導
- An in-depth exploration of how C programs transform from source code to executable binaries. This repository contains a comprehensive guide to understanding linking, loading, and executable formats
- https://technology.riotgames.com/news/riots-approach-anti-cheat
- https://github.com/87andrewh/WeirdAntiCheatIdeas
- https://github.com/gmh5225/AntiCheat-chrysalis
- https://www.unknowncheats.me/forum/anti-cheat-bypass/481731-tutorial-ring3-anticheat-project.html
- https://github.com/dhondta/awesome-executable-packing [Executable File Packing]
- https://anti-debug.checkpoint.com [Anti Debug]
- https://github.com/DenuvoSoftwareSolutions/DVRT [DVRT]
- https://areweanticheatyet.com [A list of games using anti-cheats]
- https://github.com/MyHwu9508/alt-V-Anticheat-Guide [GTA5 MP servers]
- https://github.com/frank2/packer-tutorial [Packer]
- https://github.com/kid-gorgeous/ghostbusters [Senior Design: Anit-Cheat Detection system]
- https://github.com/Solaree/pairipcore [Public researchings of the Google's Android apps protection]
壓力測試
- https://github.com/niemand-sec/AntiCheat-Testing-Framework [Testing Framework]
- https://github.com/gmh5225/MemWars [Testing Framework]
- https://github.com/ekknod/EC [Testing Framework]
- https://github.com/stuxnet147/Known-Driver-Mappers [Known Driver Mappers]
- https://github.com/DanielRTeixeira/injectAllTheThings [Injection Testing]
- https://github.com/MahmoudZohdy/Process-Injection-Techniques [Injection Testing]
- https://github.com/zoand/Injectors [Injection Testing]
- https://github.com/guided-hacking/GuidedHacking-Injector [Injection Testing]
- https://github.com/gmh5225/rust-dll-crab [Injection Testing]
- https://github.com/odzhan/injection [Injection Testing]
- https://github.com/w1u0u1/kinject [Injection Testing]
- https://github.com/D4stiny/ThreadJect [Injection Testing]
- https://github.com/KooroshRZ/Windows-DLL-Injector [Injection Testing]
- https://github.com/Fahersto/code_injection [Injection Testing]
- https://github.com/deepinstinct/Dirty-Vanity [Injection Testing:RtlCreateProcessReflection]
- https://github.com/NullTerminatorr/ThreadHijackingInjector [Injection Testing]
- https://github.com/Skengdo/simple-SetWindowsHookExW-injector [Injection Testing:SetWindowsHookExW]
- https://github.com/gmh5225/SetWindowsHookEx-Injector [Injection Testing:SetWindowsHookExW]
- https://github.com/FULLSHADE/Jektor [Injection/Shellcode Testing]
- https://github.com/KANKOSHEV/face-injector-v2 [Injection/ Testing]
- https://github.com/notscimmy/libelevate [Elevating Handle]
- https://github.com/ZoondEngine/NoBastian_v2 [Elevating Handle By LSASS]
- https://github.com/Ricardonacif/launcher-abuser [Elevating Handle]
- https://github.com/ContionMig/LSASS-Usermode-Bypass [Elevating Handle By LSASS]
- https://github.com/gmh5225/LSASS-DumpThatLSASS [Elevating Handle By LSASS]
- https://github.com/kkent030315/Van1338 [Elevating Handle By Timing Attack]
- https://github.com/gmh5225/Handle-Ripper [DuplicateHandle]
- https://github.com/Kudaes/Dumpy [Reuse opened handles By LSASS]
- https://github.com/zorftw/lsass-extend-mapper [Manual mapper from LSASS]
- https://github.com/Mattiwatti/EfiGuard [PG Testing]
- https://github.com/9176324/Shark [PG Testing]
- https://github.com/gmh5225/HideDriverTesting [Hide Driver Testing]
- https://github.com/nbqofficial/HideDriver [Hide Driver Testing]
- https://github.com/ExpLife0011/HideDriver [Hide Driver Testing]
- https://github.com/BadPlayer555/TraceCleaner [Hide Driver Testing]
- https://github.com/muturikaranja/disable-threat-tracing [ETW Testing]
- https://github.com/Mr-Un1k0d3r/AMSI-ETW-Patch [ETW Testing]
- EDRSandblast/KernellandBypass/ETWThreatIntel.c [ETW Testing]
- https://github.com/daswareinfach/Battleye-VAC-EAC-Kernel-Bypass [FsFilter Testing]
- https://github.com/aahmad097/MMFCodeInjection [User APC + File Mapping Testing]
- https://github.com/liors619/TtdAntiDebugging [Debug Testing]
- https://github.com/gmh5225/cheat-attack-thread-slemu [Hearbeat Testing]
- https://github.com/nkga/cheat-driver [MmCopyVirtualMemory Testing]
- https://github.com/zxd1994/vt-debuuger [Hacked Hypervisor Testing]
- https://github.com/3526779568/vt-debuger [Hacked Hypervisor Testing]
- https://github.com/MellowNight/AetherVisor [Hacked Hypervisor Testing AMD]
- https://github.com/rbmm/LockFile-Poc [Lock File]
- https://github.com/gmh5225/UltraDriver-Game-Cheat [Cheat Driver]
- https://github.com/gmh5225/Kernel-Special-APC-ReadProcessMemory [RPM]
Driver Unit Test Framework
- https://github.com/wpdk/wdutf
Anti Debugging
- https://github.com/LordNoteworthy/al-khaser
- https://github.com/hfiref0x/WubbabooMark
- https://github.com/samshine/ScyllaHideDetector2
- https://github.com/revsic/AntiDebugging
- https://github.com/Ahora57/MAJESTY-technologies
- https://github.com/AdvDebug/AntiCrack-DotNet [CSharp]
- https://github.com/weak1337/CEDetector [CE]
- https://github.com/gmh5225/Detection-CheatEngine [CE]
- https://github.com/gmh5225/Detection-CheatEngine-Ring0 [CE]
- https://github.com/gmh5225/AntiDbg-AmogusPlugin
- https://gtoad.github.io/2017/06/25/Android-Anti-Debug [Android]
- https://github.com/polaryy/AntiDebugandMemoryDump [Android]
- https://github.com/fiord/ADB-Debug-Detect-Checker [Android]
- Sample anti-debug with detect ScyllaHide/HyperHide and TitanHide
- Linux anti-debugging techniques
- https://github.com/HackOvert/AntiDBG
- https://github.com/BarakAharoni/LADD [Linux]
- https://github.com/0xor0ne/debugoff [Linux]
- https://github.com/gmh5225/AntiKernelDebug-POC [Windows Kernel]
- https://github.com/BaumFX/cpp-anti-debug
- https://github.com/Metick/Anti-Debug
- https://github.com/Ahora57/RaceCondition
- https://github.com/AdvDebug/AntiCrack-DotNet [DotNet]
- https://github.com/hotline1337/umium [C++/CLI]
- https://github.com/YouNeverKnow00/Anti-Debugger-Protector-Loader
- https://github.com/CheckPointSW/showstopper
- https://github.com/secrary/makin [Reveal anti-debugging and anti-VM tricks]
Page Protection
- https://github.com/changeofpace/Self-Remapping-Code
- https://github.com/ReFo0/anti-crack-system
- https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-addsecurememorycachecallback
- https://github.com/weak1337/NO_ACCESS_Protection
- https://github.com/noff2k/no-access-protection-x86
- https://github.com/hotline1337/page_no_access
- https://github.com/thefLink/DeepSleep
- https://github.com/janoglezcampos/DeathSleep
- https://github.com/gmh5225/Sleep-obf-TDP
- https://github.com/mgeeky/ShellcodeFluctuation
- https://github.com/Gofrettin/veh-printf-hook [VEH + PAGE_GUARD]
- https://github.com/charliewolfe/PointerGuard [VEH + PAGE_GUARD]
- https://github.com/connormcgarr/EATGuard [VEH + PAGE_GUARD]
- https://github.com/gmh5225/MemoryGuard [VEH + PAGE_GUARD]
- https://github.com/vxCrypt0r/Voidmaw [VEH + PAGE_GUARD]
- https://github.com/ilovecsad/veh_hide_memory [veh + page_noaccess]
- https://github.com/gmh5225/page_no_access-not-byfron [veh + page_noaccess]
- https://github.com/saveme712/bincon [veh + page_noaccess]
二進制包裝工
- https://github.com/dhondta/awesome-executable-packing
- https://github.com/phra/PEzor
- https://github.com/czs108/PE-Packer [X86]
- https://github.com/longqun/packer [x86]
- https://github.com/atsahikian/pe-protector [x86]
- https://github.com/mkaring/confuserex [.net]
- https://github.com/iartorias/debug_remover [strip調試信息]
- https://github.com/ytk2128/pe32-password
- https://github.com/frkngksl/Huan
- https://github.com/frkngksl/hintinject [hint/name表]
- https://github.com/ClaudiuGeorgiu/Obfuscapk [Android]
- https://github.com/magnussen7/Embuche [ELF]
- https://github.com/EgeBalci/amber
- https://github.com/SamLarenN/PePacker
- https://github.com/Systemcluster/wrappe [Rust]
- https://github.com/vsteffen/woody_woodpacker [ELF]
- https://github.com/n4sm/m0dern_p4cker [ELF]
- https://github.com/JonDoNym/peinjector
- https://github.com/craids/AresFramework
- https://github.com/andrew9382/exe_packer
- https://github.com/dr4k0nia/Origami [Compressing .net assemblies]
- https://github.com/mix64/ELFpacker [ELF]
- https://github.com/jnastarot/shibari [Linking multiple PEPE + files to one]
- Simple ELF runtime packer for creating stealthy droppers
- A simple packer working with all PE files which cipher your exe with a XOR implementation
- https://github.com/r0ngwe1/petoy [PE]
- An ELF / PE packer written in pure C
- https://github.com/droberson/ELFcrypt [ELF RC4]
- https://github.com/timhsutw/elfuck [ELF]
- https://github.com/Eronana/packer [PE]
- https://github.com/akuafif/hXOR-Packer [PE XOR]
- https://github.com/arisada/midgetpack [ELF]
- https://github.com/friedkiwi/netcrypt [.NET]
- https://github.com/89luca89/pakkero [ELF]
- https://github.com/dimkr/papaw [LZMA]
- https://github.com/akawashiro/sloader [ELF loader which aims to replace ld-linux.so of glibc]
- https://github.com/MahmoudZohdy/IAT-Obfuscation [IAT Obfuscation]
- https://github.com/gmh5225/shellcode-EntropyFix [Reducing entropy]
- https://github.com/ORCx41/AtomPePacker [PE X64]
- https://github.com/Lima-X/Win32.Nebula [PE X64]
- https://github.com/TheAenema/hm-pe-packer [PE X64]
- https://github.com/hid3rx/PEPacker [PE X64]
- https://github.com/xsj3n/x64-EXE-Packer [PE X64]
- https://github.com/frkngksl/Shoggoth [Polymorphic Encryptor]
- https://github.com/GunshipPenguin/kiteshield [ELF X64]
- https://github.com/cff0x/KitsuPE [PE]
- https://github.com/KooroshRZ/Evader [PE]
- https://github.com/greyb1t/GreyM [PE]
- https://github.com/DavidBuchanan314/stelf-loader [ELF X64 loader]
- https://github.com/frank2/oxide [Written by Rust]
- https://github.com/Washi1337/AwaitFuscator [.NET]
CLR Protection
- https://github.com/endgameinc/ClrGuard
Anti Disassembly
- https://github.com/rrbranco/blackhat2012
Sample Unpacker
- https://github.com/hasherezade/mal_unpack_drv
- https://github.com/strazzere/android-unpacker [Android]
Dump Fix
- https://github.com/t3ssellate/unmapper
- https://github.com/d35ha/DumpPE
- https://github.com/pr701/fix-arxan
Encrypt Variable
- https://github.com/serge-14/encrypted_value [C++]
- https://github.com/momalab/e3 [C++]
- https://github.com/obama-gaming/xor-float [C++]
- https://github.com/emlinhax/xv [C++]
Lazy Importer
- https://github.com/JustasMasiulis/lazy_importer
- https://github.com/hypervisor/kli
- https://github.com/gmh5225/kli-ex
- https://github.com/1hAck-0/zeroimport
- https://github.com/emlinhax/blitz
Compile Time
- https://github.com/ManulMap/malstring [Using c++23 compile-time magic to produce obfuscated PIC strings and arrays]
- https://github.com/reveny/Android-Native-Import-Hide [A library for hiding and retrieving imports in ELF binaries]
- https://github.com/emlinhax/blitz [a header-only library to dynamically resolve modules and exports while also being able to call them directly]
- https://github.com/emlinhax/xv [single-header pointer/value encryption]
- https://github.com/ac3ss0r/obfusheader.h [Obfusheader.h is a portable header file for C++14 compile-time obfuscation]
- https://github.com/SecondNewtonLaw/DriverBase/blob/dev/Dependencies/obfusheader.h [obfusheader.h for windows driver]
- https://github.com/dronavallipranav/rust-obfuscator [Automatic Rust Obfuscator and Macro Library]
- https://github.com/Sherman0236/XorData [A C++17 framework designed to enable obfuscation of constants, variables, and strings]
- https://github.com/android1337/crycall [Compile-Time Calls Obfuscator for C++14]
- https://github.com/JustasMasiulis/inline_syscall [Inline syscalls made easy for windows on clang]
- https://github.com/66flags/inline-syscall [A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs]
- https://github.com/cristeigabriel/STB [Compile-time conversion library, from IDA-style string to array]
- https://github.com/Deniskore/CompileTimeRandom [Compile time random implementation using C++11]
- https://github.com/ThatLing/limba [compile-time control flow obfuscation using mba]
- https://github.com/Nou4r/Polymorphic-Engine [Prototype runtime C++ polymorphic type engine]
- https://github.com/hanickadot/cthash [constexpr implementation of SHA-2 and SHA-3 family of hashes]
- https://github.com/PaulNorman01/Dynamizer [Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules]
- https://github.com/hanickadot/compile-time-regular-expressions [Compile Time Regular Expression in C++]
- https://github.com/CasualX/obfstr [String Crypter for rust]
- https://github.com/redskal/obfuscatxor [String Crypter for golang]
- https://github.com/Reijaff/static_string_obfuscation [String Crypter for Zig]
- https://github.com/pykaso/Swift-String-Obfuscator [String Crypter for Swift]
- https://github.com/android1337/crystr [String Crypter]
- https://github.com/adamyaxley/Obfuscate [String Crypter]
- https://github.com/igozdev/xorlit [String Crypter]
- https://github.com/JustasMasiulis/xorstr [String Crypter]
- https://github.com/skadro-official/skCrypter [String Crypter]
- https://github.com/rad9800/BloatedHammer [API Hammering with C++20 by folding (avoiding loops)]
- https://github.com/obama-gaming/xor-float [xor float]
- https://github.com/llxiaoyuan/oxorany [obfuscated any constant encryption in compile time on any platform]
- https://github.com/DosX-dev/obfus.h [Macro-header for compile-time C obfuscation (tcc, win x86/x64)]
Shellcode Engine & Tricks
- https://github.com/jseclab/obj2shellcode
- https://github.com/lainswork/shellcode-factory
- https://github.com/H1d3r/GPU_ShellCode [hide the payload inside the gpu memory]
Obfuscation Engine
- https://github.com/vi3t1/vmprotect-3.5.1
- https://github.com/DosX-dev/obfus.h [Macro-header for compile-time C obfuscation (tcc, win x86/x64)]
- https://github.com/connorjaydunn/BinaryShield
- https://github.com/mike1k/perses
- https://github.com/weak1337/Alcatraz
- https://github.com/FigmaFan/Alcatraz
- https://github.com/es3n1n/obfuscator
- https://github.com/jnastarot/furikuri
- https://github.com/nickcano/RelocBonus [Attack Reloc]
- https://github.com/maoabc/nmmp [Dex]
- https://github.com/CodingGay/BlackObfuscator [Dex]
- https://github.com/d35ha/CallObfuscator [Call Obfuscation]
- https://github.com/nelfo/Milfuscator
- https://github.com/romainthomas/the-poor-mans-obfuscator [elf/macho]
- https://github.com/Guardsquare/proguard [Java]
- https://github.com/xiaoweime/WProtect
- https://github.com/DeDf/WProtect
- https://github.com/jokerNi/WProtectSDK
- https://github.com/cxxrev0to1dev/nb_obfuscator
- https://github.com/gmh5225/cerberus [VM]
- https://github.com/layerfsd/phantasm-x86-virtualizer [VM]
- https://github.com/felix-rs/guardian-rs [VM]
- https://github.com/CalebFenton/simplify [Java]
- https://github.com/open-obfuscator/dProtect [Java/Kotlin]
- https://github.com/Maldev-Academy/EntropyReducer [Reduce Entropy]
- https://github.com/Washi1337/AwaitFuscator [.NET]
螢幕截圖
- https://github.com/bavulapati/DXGICaptureApplication [Capture Desktop]
- https://github.com/Rick-laboratory/Windows-Screenshotcapture-DirectX/blob/master/main.cpp [DX9]
- https://github.com/lainswork/dwm-screen-shot [DWM]
- https://github.com/kirides/screencapture [DX11]
- https://github.com/bmharper/WindowsDesktopDuplicationSample [DXGI]
- https://github.com/PierreCiholas/GetPixel-vs-BitBlt_GetDIBits [GetPixel]
- https://github.com/gmh5225/ScreenShot [BitBlt]
Game Engine Protection:Unreal
- https://github.com/zompi2/Static-Variables-Obfuscator-UE4
- https://github.com/gmh5225/UE-Plugin-SCUE4-Plugin
- https://github.com/gmh5225/UnrealEngine-Protection
遊戲引擎保護:團結
- https://github.com/ls9512/USecurity
- https://github.com/bmjoy/Unity3D_Obfuscator
- https://github.com/Ether2023/Ether-Uprotector
- https://github.com/badApple001/Il2cppEncrtypt
遊戲引擎保護:來源
- 來源引擎服務器反陳詞插件。 (CS:S,CS:GO,CS:P,TF2)
開源反作弊系統
- https://github.com/mq1n/NoMercy
- https://github.com/nomercy-ac [nomercy]
- https://github.com/JackBro/BetaShield
- https://github.com/chztbby/RebirthGuard
- https://github.com/GravitLauncher/Avanguard
- https://github.com/Rycooop/Bloom-Anticheat
- https://github.com/vasieco/kernel-anticheat [kernel anticheat]
- https://github.com/AvivShabtay/Stresser [Anti Virus in fact but also Anti Cheat]
- https://github.com/gmh5225/antivirus [Anti Virus in fact but also Anti Cheat]
- https://github.com/D4stiny/PeaceMaker [Anti Virus in fact but also Anti Cheat]
- https://github.com/danielkrupinski/VAC [Reversed VAC]
- https://github.com/ApexLegendsUC/anti-cheat-emulator
- https://github.com/ch4ncellor/EAC-Reversal [Reversed EAC]
- https://github.com/weak1337/BE-Shellcode [Reversed BE Shellcode]
- https://github.com/SamuelTulach/be_shellcode_dump [Reversed BE Shellcode]
- https://github.com/codetronik/AndroidAntiCheat [Android Platform]
- https://github.com/Lazenca/Lazenca-S [Android Platform]
- https://github.com/MrDiamond64/Scythe-AntiCheat [Minecraft]
- https://github.com/GrimAnticheat/Grim [Minecraft]
- https://github.com/mateusreb/AntiCheat
- https://github.com/ComodoSecurity/openedr [EDR]
- https://github.com/0xrawsec/whids [EDR]
- https://github.com/Neo23x0/Raccine [EDR]
- https://github.com/ION28/BLUESPAWN [EDR]
- https://github.com/TheHive-Project/TheHive [EDR]
- https://github.com/wazuh/wazuh [XDR]
- https://github.com/AlSch092/UltimateAntiCheat
- https://github.com/JonathanBerkeley/Quack
- 來源引擎服務器反陳詞插件。 (CS:S,CS:GO,CS:P,TF2)
- This is the Anti Cheat System for Knight Online Gamesoft vversion
- User-mode C++ Anti-Cheat written for German Roleplay Server GVMP.de
- Cheat developer platform
- https://github.com/ekknod/Anti-Cheat-TestBench [TestBench]
- https://github.com/gmh5225/Malicious-code-detection-bugu [Malicious code detection and obfuscation]
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System
- https://github.com/gmh5225/Anticheat-android-cheap-engine [Sample implementation of anti-cheat in android]
- Proof of concept Anti-Cheat plugin for CS:GO
- Deep Learning Anti-Cheat For CSGO
- Deep Learning Anti-Cheat For CSGO
- https://github.com/jnastarot/anti-cheat
- https://github.com/jnastarot/ice9
- https://github.com/realTristan/Reborn [Designed with Rust]
- https://github.com/dllcrt0/Dynsec
- https://github.com/XZNX5/Basic_Anti-Cheat
- https://github.com/MegaAntiCheat
- https://github.com/donnaskiez/ac
- https://github.com/gmh5225/AcDrv
- https://github.com/sc-222/Mandragora [For Assault Cube]
- https://github.com/J-Tanzanite/Little-Anti-Cheat [For Source Games]
Analysis Framework
- https://github.com/pandora-analysis/pandora
Detection:Hook
- https://github.com/hasherezade/pe-sieve
- https://github.com/mike1k/HookHunter
- https://github.com/st4ckh0und/hook-buster
- https://github.com/gmh5225/Driver-Detect-nullshit
- https://github.com/paranoidninja/etwti-syscall-hook [儀器回調]
- https://github.com/Luchinkin/device-control-hooks-scanner [device-control-hooks-scanner]
- https://github.com/ORCx41/KnownDllUnhook [Replace the .txt section of the current loaded modules from KnownDlls]
Detection:Memory Integrity
- https://github.com/afulsamet/integrity
- https://github.com/Midi12/QueryWorkingSetExample
- https://github.com/Deputation/integrity_experiments [header only]
Detection:ShellCode
- https://github.com/jdu2600/EtwTi-FluctuationMonitor [ETW]
- https://github.com/jdu2600/Etw-SyscallMonitor [ETW]
- https://github.com/jdu2600/CFG-FindHiddenShellcode [CFG]
Detection:Attach
- https://github.com/KANKOSHEV/Detect-KeAttachProcess
Detection:Triggerbot & Aimbot
- https://github.com/KANKOSHEV/Detect-MouseClassServiceCallback
- https://github.com/changeofpace/MouHidInputHook
- https://github.com/KelvinMsft/UsbMon
- https://github.com/87andrewh/DeepAimDetector [Deep Learning]
- https://github.com/waldo-vision/waldo [Deep Learning]
- https://github.com/waldo-vision/aimbot-detection-prototype [Deep Learning]
- https://github.com/bananya-ml/anti-cheat [Deep Learning for CSGO]
- https://github.com/hkx3upper/Karlann [Keyboard]
- https://github.com/Oliver-1-1/MouseDetection [Mouse]
- https://github.com/Oliver-1-1/EtwKeyboardDetection [ETW]
Detection:Hide
- https://github.com/KANKOSHEV/Detect-HiddenThread-via-KPRCB
- https://github.com/ekknod/Anti-Cheat-TestBench [KPRCB+PTE]
- https://github.com/weak1337/SystemThreadFinder
- https://github.com/mq1n/HiddenModuleDetector
- https://github.com/KelvinMsft/ThreadSpy
- https://github.com/Rwkeith/Nomad [Mapped Driver]
- https://github.com/nou4r/modfinder [映射DLL]
- https://github.com/1401199262/NMIStackWalk [Mapped Driver by NMI Callback]
- https://github.com/donnaskiez/nmi-callback-handler [Mapped Driver by NMI Callback]
- https://github.com/gmh5225/Kernel_Anti-Cheat [NMI]
- https://github.com/jafarlihi/modreveal [Find hidden Linux kernel modules]
- https://github.com/gmh5225/Hidden-Thread-Finder [Detect hidden threads]
- https://github.com/gmh5225/StealthSytemThreadFinderBE [Detect hidden threads]
- https://github.com/eversinc33/unKover [Using NMI/APC to detect mapped drivers]
- https://github.com/gmh5225/Rootkit-2 [Using CsrRootProcess to detect hidden process]
Detection:Vulnerable Driver
- https://github.com/Deputation/hygieia
- https://github.com/FaEryICE/MemScanner
Detection:EFI Driver
- https://github.com/gmh5225/Detect-EFIGuard
Detection: Hacked Hypervisor
- https://secret.club/2020/04/13/how-anti-cheats-detect-system-emulation.html
- https://github.com/helloobaby/Nmi-Callback [NMI Callback]
- https://github.com/momo5502/ept-hook-detection [Detect EPT]
- https://github.com/gmh5225/Detect-Hypervisor_detect_ring_0
- https://github.com/jonomango/nohv
- https://github.com/void-stack/Hypervisor-Detection
- https://github.com/cryotb/vmdtstr [檢測VMM是否有缺陷的Str Exit]
檢測:虛擬環境
- https://github.com/a0rtega/pafish
- https://github.com/gmh5225/detection-hyper-V [hyper-v]
- https://github.com/gmh5225/go-detection-hyper-V [hyper-v]
- https://github.com/Ahora57/MAJESTY-technologies
- https://github.com/therealdreg/anticuckoo [cuckoo]
- https://github.com/strazzere/anti-emulator [Android Anti-Emulator]
- https://github.com/gmh5225/android-emulator-detection [android抗emulator]
- https://github.com/reveny/android-emulator-detection [android抗emulator]
- https://github.com/lloydlabs/wsb-detect [Windows sandbox(“ WSB”)]
- https://github.com/DevDaveid/AntiDebug-AntiVM [Vbox]
- https://github.com/LukeGoule/compact_vm_detector
- https://github.com/kernelwernel/VMAware [VM detection library]
- https://github.com/su-vikas/conbeerlib [Android library for detecting Android virtual containers]
- https://github.com/can1357/hvdetecc [Collection of hypervisor detections]
Detection:HWID
- All methods of retrieving unique identifiers(HWIDs) on your PC
- https://github.com/medievalghoul/hwid-checker-mg
- https://github.com/weak1337/NvidiaApi
- https://github.com/paradoxwastaken/WindowsHardwareInfo
- https://github.com/gmh5225/query-gpu-name-rs [GPU name for windows]
- https://github.com/lavoiesl/osx-cpu-temp [CPU temperature for OSX]
- https://github.com/ashleyhung/WinRing0 [CPU temperature for windows]
- https://github.com/openhardwaremonitor/openhardwaremonitor
- https://github.com/LibreHardwareMonitor/LibreHardwareMonitor
- https://github.com/lfreist/hwinfo [cross platform C++ library for hardware information (CPU, RAM, GPU)]
- https://github.com/KDIo3/PCIBan [A PoC for requesting HWIDs directly from hardware]
- https://github.com/can1357/hvdetecc [Collection of hypervisor detections]
- https://github.com/synctop/tpm-mmio [Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key]
- https://github.com/asm1314/uncloaking-raid0-hwid-serials [收集隱藏在RAID0後面的原始磁盤序列]
- https://github.com/hubblo-org/windows-rapl-driver [Windows driver to get RAPL metrics from a bare metal machine]
- https://github.com/trustdecision/trustdevice-android [android]
- https://github.com/trustdecision/trustdevice-ios [ios]
檢測:Speedhack
- https://github.com/doranekosystems/cheap-engine [android]
檢測:注射
- https://github.com/mq1n/DLLThreadInjectionDetector
- https://github.com/nou4r/modfinder [映射DLL]
- https://github.com/gmh5225/driver-watchowl [ImagEnotify+stack Trace]
- https://github.com/xuanxuan0/TiEtwAgent [ETW]
Detection:Spoof Stack
- https://github.com/gabriellandau/ShadowStackWalk
- https://github.com/cryotb/RASD
Detection:ESP
- https://github.com/weak1337/PresentHookDetection
Detection:DMA
- https://github.com/gmh5225/DmaProtect [VT-d/IOMMU]
- https://github.com/iqrw0/DieDMAProtection [IOMMU]
- https://github.com/ekknod/drvscan [Scanner]
- https://github.com/gmh5225/PCIE-Detector [Config Config Space]
Detection:Wall Hack
- https://github.com/87andrewh/CornerCulling
- https://github.com/87andrewh/CornerCullingSourceEngine
Detection:Obfuscation
- https://github.com/mrphrazer/obfuscation_detection
Detection:Android root
- https://github.com/rushiranpise/detection [Collection of Various Root Detection Apps for Android]
- https://github.com/vvb2060/keyattestation [bootloader]
- https://github.com/reveny/android-native-root-detector [用於檢測Android上根的工具]
Detection:Magisk
- https://github.com/vvb2060/MagiskDetector
- https://github.com/canyie/MagiskKiller
- https://github.com/Dr-TSNG/ApplistDetector
- https://github.com/apkunpacker/MagiskDetection
- https://github.com/canyie/magiskeop [exploit]
檢測:弗里達
- https://github.com/darvincisec/DetectFrida
- https://github.com/qtfreet00/AntiFrida
- https://github.com/muellerberndt/frida-detection
- https://github.com/apkunpacker/Anti-Frida [Some Of Anti-Frida Stuff]
Detection:Overlay
- https://github.com/geeksonsecurity/android-overlay-protection [Android]
Signature Scanning
- https://github.com/c3rb3ru5d3d53c/binlex
- https://github.com/mischasan/aho-corasick
Information System & Forensics
- https://github.com/Enum0x539/Qvoid-Token-Grabber
- https://github.com/travisfoley/dfirtriage
- https://github.com/AlessandroZ/LaZagne
- https://github.com/thewhiteninja/ntfstool
- https://github.com/mgeeky/ntfs-journal-viewer
- https://github.com/volatilityfoundation/volatility
- https://github.com/volatilityfoundation/volatility3
- Decrypt and export browser password, including Chromium,Edge and Firefox
- https://github.com/gtworek/VolatileDataCollector
- https://github.com/mubix/netview
- https://github.com/rbmm/USN
- https://github.com/rbmm/SearchEx
- https://github.com/ch3rn0byl/ANTfs
- https://github.com/strozfriedberg/ntfs-linker
- https://github.com/NTFSparse/ntfs_parse
- https://github.com/bluecapesecurity/PWF [Windows Forensics Training]
- https://github.com/qwqdanchun/Pillager [For exporting and decrypting useful data from target computer]
- https://github.com/Psmths/windows-forensic-artifacts [Guide to the various Windows forensic artifacts]
- https://github.com/rabbitstack/fibratus [Windows kernel exploration and tracing]
- https://github.com/google/grr [remote live forensics]
- https://github.com/MrMugiwara/FTK-imager-OSX [Forensics Tools For MAC OS X]
- https://github.com/h4sh5/DumpIt-mirror [DumpIt for windows]
- https://github.com/MagnetForensics/dumpit-linux [DumpIt for linux]
Dynamic Script
- https://github.com/can1357/NtLua
- https://github.com/mrexodia/NtPhp
- https://github.com/FastVM/minivm
- https://github.com/jnz/q3vm
Kernel Mode Winsock
- https://github.com/MiroKaku/libwsk [Kernel-Mode Winsock library]
fuzzer
- https://github.com/0vercl0k/wtf
OPENCV
- https://github.com/YouNeverKnow00/Rust-Auto-Weapon-Detection-OpenCV-Example
Windows Ring3回調
- https://github.com/aahmad097/AlternativeShellcodeExec
- https://github.com/RixedLabs/IDLE-Abuse
- https://github.com/Wra7h/FlavorTown
- https://github.com/depuntion/instrumentation_callbacks [instrumentation呼叫]
- https://github.com/r4yven/beservice_intcallbacks [儀器回調]
- https://github.com/secrary/hooking-via-instrumentationCallback [instrumentation呼叫]
- https://github.com/paranoidninja/etwti-syscall-hook [儀器回調]
- https://github.com/jackullrich/syscall-detect [Instrumentation Callback]
- https://github.com/thetuh/anticheat-poc [Instrumentation Callback]
- https://github.com/1027565/InstrumentationCallbacks [Instrumentation Callback]
- Register VEH by hooking RtlpCallVectoredHandlers
- ATPMiniDump Callback
- https://github.com/jimbeveridge/readdirectorychanges [ReadDirectoryChangesW]
- https://github.com/blaquee/dllnotif [DllNotification]
- https://github.com/gmh5225/LdrRegisterDllNotification-modify-testing [DllNotification]
Windows Ring0 Callback
- https://github.com/gmh5225/kernel-callback-functions-list [Callback List]
- Enumerate Callback
- ImageNotify Callback With RtlWalkFrameChain
- SymlinkCallback
Winows User Dump Analysis
- https://github.com/0vercl0k/udmp-parser
Winows Kernel Dump Analysis
- https://github.com/gmh5225/Tool-DIYSystemMemoryDump [DIY Dump Type]
- https://github.com/0vercl0k/kdmp-parser [Python 3 bindings]
- https://github.com/mrexodia/dumpulator [Emulating code in minidump files]
- https://github.com/0vercl0k/symbolizer [Execution trace symbolizer]
- https://github.com/libyal/libmdmp [Minidump]
- https://github.com/tasox/miniDumpReader [Minidump]
Sign Tools
- https://github.com/mtrojnar/osslsigncode
- https://github.com/gmh5225/chainoffools [CVE]
- https://github.com/mattifestation/WDACTools [Decrypt p7b]
- https://github.com/utoni/PastDSE [Sign Leaked Cert]
- https://github.com/Jemmy1228/HookSigntool [Sign Leaked Cert]
- https://github.com/namazso/MagicSigner [Sign Leaked Cert]
- https://github.com/hzqst/FuckCertVerifyTimeValidity [Sign Leaked Cert]
- https://github.com/mathisvickie/sign-expired [Sign Leaked Cert]
- https://github.com/hackerhouse-opensource/SignToolEx [Sign Leaked Cert]
備份文件
- https://github.com/guidoreina/minivers [Generates Backup Copies]
Backup Drivers
- https://github.com/gloriouslegacy/ezDrvBAK [Backup & restrore the Windows-Drivers]
Black Signature
- https://github.com/gmh5225/BlackSignatureDriver
- https://github.com/jsecurity101/MSFT_DriverBlockList
- https://github.com/Harvester57/CodeIntegrity-DriverBlocklist
- https://github.com/gmh5225/ms-vulnerable-driver-list [將Microsoft的BlockList轉換為哈希列表]
一些技巧
Windows Ring0
- https://www.unknowncheats.me/forum/general-programming-and-reversing/495279-messagebox-kernel-mode.html [msgbox]
- https://back.engineering/01/12/2020/ [PAGE表操作]
- https://git.back.engineering/_xeroxz/pskp [pte Hook]
- https://github.com/rythorndoran/pagetablehook [pte Hook]
- https://github.com/stdhu/windows-kernel-pagehook [PTE Hook]
- https://github.com/xyrem/yumekage [pte Hook]
- https://github.com/compiled-code/be-injector [攻擊牛]
- https://github.com/compiled-code/eac-mapper [脆弱的mcopymemory]
- https://github.com/eballoon/mmcopymemory [旁路mcopymemory]
- https://github.com/compiled-code/be-injector [攻擊牛]
- https://github.com/gmh5225/alcating-ividentual-pages [mmallocationdionpentedpagesex]
- https://github.com/gmh5225/hook-hvlswitchvirtualAddressspace [hvcallcodeva]
- https://github.com/1401199262/hookhvcallcodeva [hvcallcodeva]
- https://github.com/gmh5225/driver-hypercallpagehook [hvcallcodeva]
- https://github.com/xyrem/hyperdeceit [hvcallcodeva]
- https://github.com/gmh5225/callmewin32kdriver [加載驅動程序像win32k.sys]
- https://github.com/gmh5225/dsedodge-signed-kernel-driver [利用PTT擊敗DSE]
- https://github.com/wbenny/ksocket [內核伯克利插座]
- https://github.com/stephanvanschaik/windows-kernel-rs [編寫Windows內核驅動程序]
- https://github.com/ekknod/smm [SMM作弊]
- https://github.com/rbmm/kpdb [驅動程序中的解析PDB]
- https://github.com/getrektboy724/kpdb [驅動程序中的解析PDB]
- https://github.com/gmh5225/fakeenclave [濫用飛地的POC]
- https://github.com/gmh5225/letmegg [關於如何防止WindBG斷裂的POC]
- https://github.com/ucfoxi/notifyroutinehijackthread [hijack pspcreatethreadnotifyRoutine]
- getwindowname在內核模式下
- getwindowinfo以內核模式
- 掛鉤KDTRAP(Windows Global Exception Hander)[鉤KDTRAP]
- https://github.com/gmh5225/hook-kdtrap [hook kdtrap]
- https://github.com/gmh5225/acdrv [global exception/kdpdebugroutineselect]
- https://github.com/gmh5225/acdrv [swapcontext掛鉤]
- https://github.com/1401199262/hookswapcontext [SwapContext Hook]
- https://github.com/gmh5225/driver-soulextraction [提取證書信息]
- https://github.com/ido-moshe-github/cidlldemo [使用ci.dll api驗證文件的authenticode簽名]
- https://github.com/mihaly044/pedigest [計算AuthenTicode Digest]
- https://github.com/gmh5225/kernel-pecial-apc-readprocessmemory [kernel apc rpm]
- https://github.com/NSG650/Bad-BugCheck-Old [BSOD]
- https://github.com/NSG650/Bad-Bugcheck [BSOD]
- https://github.com/NSG650/NoMoreBugCheck [BSOD]
- https://github.com/NSG650/BugCheckHack [BSOD]
- https://github.com/NSG650/BugCheck2Linux [BSOD]
- https://github.com/AnalogFeelings/KmdfMandelcheck [BSOD]
- https://github.com/stuxnet147/PiDqSerializationWrite-Example [PiDqSerializationWrite]
- https://github.com/Rythorndoran/enum_real_dirbase [Find real dirbase]
- https://github.com/backengineering/POC-ExFlushTb [A POC for monitoring Tb]
- https://github.com/Cr4sh/KernelForge [A library to develop kernel level Windows payloads for post HVCI era]
- https://gist.github.com/gmh5225/ab00f831ffdf4ef608ab3b6eb0d37250 [Create process from KernelMode via APC]
- https://github.com/gmh5225/Map-file-in-system-space [MiMapViewInSystemSpace]
- https://github.com/SamuelTulach/PwnedBoot [Using Windows' own bootloader as a shim to bypass Secure Boot]
Windows Ring3
- https://secret.club/2021/01/04/thread-stuff.html [Anti Debug]
- https://github.com/utoni/PastDSE [Sign Leaked Cert]
- https://github.com/Jemmy1228/HookSigntool [Sign Leaked Cert]
- https://github.com/namazso/MagicSigner [Sign Leaked Cert]
- https://github.com/hzqst/FuckCertVerifyTimeValidity [Sign Leaked Cert]
- https://github.com/mathisvickie/sign-expired [Sign Leaked Cert]
- https://github.com/Sentient111/StealingSignatures [Stealing signatures from pe files]
- https://github.com/secretsquirrel/SigThief [Stealing signatures from pe files]
- https://github.com/jfmaes/LazySign [Fake Cert]
- https://github.com/Tylous/Limelighter [Fake Cert]
- https://github.com/gmh5225/chainoffools [Fake Cert]
- https://github.com/gmh5225/FakeSign [Fake Cert]
- https://github.com/Adepts-Of-0xCC/MiniDumpWriteDumpPoC [Dump Memory]
- A x64 Write-What-Where exploit+shellcode execution vulnerability
- Dll injection through code page id modification in registry
- https://github.com/huoji120/Etw-Syscall [ETW Syscall]
- https://github.com/weak1337/SkipHook [Skip Hook]
- https://github.com/ekknod/SetWindowHookEx [Using SetWindowHookEx for preinjected DLL's]
- A tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature
- Simple program to stream offsets for your game cheat
- https://github.com/jnastarot/HIGU_ntcall [Direct System Calls]
- https://github.com/rbmm/LockFile-Poc [Lock File]
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more
- https://github.com/gmh5225/dll-encryptor [Able to stream a dll without touching your disk]
- Running Shellcode Through EnumDisplayMonitors
- open-source windows defender manager can disable windows defender permanently
- Read Memory without ReadProcessMemory for Current Process
- get process token whose integrity level is system and manipulate it to get privilege escalation
- A library that meant to perform evasive communication using stolen browser socket
- https://github.com/cpz/trinity [Fully disables & removes Windows Defender]
- https://github.com/EvilGreys/Disable-Windows-Defender- [Disable Windows Defender]
- https://github.com/gabriellandau/ShadowStackWalk [Finding Truth in the Shadows]
- https://github.com/gmh5225/r0ak [r0ak]
- https://github.com/ZeroMemoryEx/Wizard-Loader [Abuse Xwizard.exe for DLL Side-Loading]
- https://github.com/LloydLabs/shellcode-plain-sight [Hiding shellcode in plain sight within a large memory region]
- https://github.com/huntandhackett/process-cloning [Clone process]
- https://github.com/backengineering/msrexec [Elevate arbitrary MSR writes to kernel execution]
- https://github.com/deepinstinct/Dirty-Vanity [Abusing RtlCreateProcessReflection]
- https://github.com/mandiant/ShimCacheParser [Shim Cache parser]
- https://github.com/cmuratori/pmctrace [Real-time collection of PMCs via ETW]
- https://github.com/SamuelTulach/SecureGame [POC game using VBS enclaves to protect itself from cheating]
安卓
- https://github.com/WindySha/bypassHiddenApiRestriction [Bypass hidden api restriction]
- https://github.com/LSPosed/AndroidHiddenApiBypass [Bypass hidden api restriction]
- https://github.com/stars-one/ASCTool [Apk Signature Crack Tool]
- https://github.com/ekknod/usbsn [USB serial number changer (root only)]
- https://github.com/gmh5225/Android-privilege-CVE-2022-20452-LeakValue [Privilege Escalation]
- https://github.com/tiann/KernelSU [A Kernel based root solution for Android GKI]
- https://github.com/MlgmXyysd/KernelSU_Debug [KernelSU modified for debugging]
- https://github.com/CoolestEnoch/kernel-su-huawei-nova2 [KernelSU for huawei]
- https://github.com/gmh5225/android_kernel_huawei_hi6250-8_Exp [KernelSU for huawei]
- https://github.com/abcz316/SKRoot-linuxKernelRoot [Kernel root]
- https://github.com/Dr-TSNG/ZygiskOnKernelSU [Run Zygisk on KernelSU]
Windows安全功能
- https://github.com/yardenshafir/cet-research [CET]
- https://github.com/gmh5225/CET-win10 [CET]
- HyperGuard
- https://github.com/gmh5225/QueryShadowStack [Shadow Stack]
- https://namazso.github.io/x86/html/INCSSPD_INCSSPQ.html [CET]
- https://techcommunity.microsoft.com/t5/windows-os-platform-blog/understanding-hardware-enforced-stack-protection/ba-p/1247815 [CET]
- https://reviews.llvm.org/rG21b25a1fb32ecd2e1f336123c2715f8ef1a49f97 [CET]
- https://www.osronline.com/article.cfm%5earticle=469.htm [SEH]
WSL
- https://github.com/microsoft/WSL2-Linux-Kernel
- https://github.com/sxlmnwb/windows-subsystem-linux
- https://github.com/Nevuly/WSL2-Linux-Kernel-Rolling [Stable Kernel for WSL2]
WSA
- https://github.com/K3V1991/How-to-download-and-install-WSA [Guide]
- https://github.com/KiruyaMomochi/wsa-kernel-build [Build WSA Kernel with Docker]
- https://github.com/sergiovillaverde/win11_apk_installer
- https://github.com/LSPosed/MagiskOnWSA
- https://github.com/alesimula/wsa_pacman
- https://github.com/WSA-Community/WSA-Linux-Kernel
- https://github.com/Paxxs/BuildWSA
- https://github.com/lsposed/magiskonwsalocal
- https://github.com/cinit/WSAPatch [Make WSA run on Windows 10]
- https://github.com/MustardChef/WSABuilds
- https://github.com/LSPosed/WSA-Kernel-SU [WSA with KernelSU]
Windows模擬器
- https://github.com/brunodev85/winlator [Android application for running Windows applications with Wine and Box86/Box64]
Android模擬器
- https://github.com/Genymobile
- https://github.com/Genymobile/genymotion-kernel
- https://github.com/anbox/anbox
- https://github.com/jwmcglynn/android-emulator
- https://github.com/google/android-emulator-hypervisor-driver
- https://github.com/ant4g0nist/rudroid [Rust]
- https://github.com/qemu-gvm/qemu-gvm [QEMU]
- https://github.com/quarkslab/AERoot [Root]
iOS模擬器
- https://github.com/ChefKissInc/qemu-apple-silicon
遊戲男孩
- https://github.com/xkevio/kevboy [Emulator]
- https://github.com/vojty/feather-gb [Emulator]
- https://github.com/chrismaltby/gb-studio [GB Studio]
任天堂開關
- https://github.com/yuzu-mirror
- https://github.com/Ryujinx/Ryujinx
- https://github.com/gmh5225/Nintendo-Switch-Emulator-yuzu
- https://github.com/gmh5225/yuzu-android
- https://github.com/Logboy2000/yuzu-archive
- https://github.com/gmh5225/nuzu [Yuzu based repository]
- https://github.com/CTCaer/hekate [A GUI based Nintendo Switch Bootloader]
- https://github.com/Atmosphere-NX/Atmosphere [Customized firmware]
- https://github.com/tomvita/SE-tools [Memory hacking]
- https://github.com/jakcron/nstool [General purpose read/extract tool]
Xbox
- https://github.com/xemu-project/xemu [Xbox Emulator for Windows]
- https://github.com/rexdex/recompiler [Porting Xbox360 executables to Windows]