令人敬畏的游戏安全
作者:Sec-Labs | 发布时间:
项目地址
https://github.com/gmh5225/awesome-game-security
如何贡献?
内容
- 游戏引擎
- 数学
- 渲染器
- 3D图形
- 人工智能
- 图像编解码器
- 波前对象
- 任务调度器
- 游戏网
- PhysX SDK
- 游戏开发
- 游戏资产
- 游戏热补丁
- 游戏测试
- 游戏工具
- 游戏经理
- 游戏CI
- Web3 游戏
- 直接X
- OpenGL
- 欺骗
- 反作弊
- 一些技巧
- Windows 安全功能
- 适用于 Linux 的 Windows 子系统
- 适用于 Android 的 Windows 子系统
- 安卓模拟器
游戏引擎
指导
- https://github.com/QianMo/Game-Programmer-Study-Notes
- https://github.com/Gforcex/OpenGraphic [图形引擎和游戏引擎列表]
- https://github.com/ThisisGame/cpp-game-engine-book
- https://github.com/netwarm007/GameEngineFromScratch
- https://forums.unrealengine.com [虚幻引擎]
- https://docs.unrealengine.com [虚幻引擎]
- https://www.unrealengine.com/resources [虚幻引擎]
- https://github.com/mikeroyal/Unreal-Engine-Guide [虚幻]
- https://github.com/Allar/ue5-style-guide [虚幻]
- https://github.com/revan1611/UE-Interview-Cheat-Sheet [虚幻]
- https://github.com/tomlooman/ue4-tutorials [虚幻]
- https://github.com/JaredP94/Unreal-Development-Guides-and-Tips [虚幻]
- https://github.com/lettier/3d-game-shaders-for-beginners [着色器]
- https://github.com/PardCode/OpenGL-3D-Game-Tutorial-Series [OpenGL]
- https://github.com/PardCode/CPP-3D-Game-Tutorial-Series [DirectX]
- https://github.com/ssloy/tinyrenderer [渲染]
- https://github.com/crazyshader/GameDev [统一]
- https://github.com/RyanNielson/awesome-unity [统一]
- https://github.com/shadirvan/Unity-Cheat-Sheet [统一]
- https://github.com/QianMo/Unity-Design-Pattern [统一设计]
- https://github.com/whx-prog/The-Seed-Link-Future [Unity VR]
- https://github.com/twohyjr/Metal-Game-Engine-Tutorial [Apple 的 Metal Api]
来源
- https://github.com/EpicGames/UnrealEngine
- https://github.com/Unity-Technologies/UnityCsReference [C# 参考]
- https://github.com/cocos2d/cocos2d-x
- https://github.com/cocos/cocos-engine
- https://github.com/CRYTEK/CRYENGINE
- https://github.com/panda3d/panda3d
- https://github.com/ValveSoftware/source-sdk-2013
- https://github.com/gmh5225/source-sdk-orangebox
- https://github.com/UTINKA/source-engine.2003
- https://github.com/VSES/SourceEngine2007
- https://github.com/nillerusr/source-engine
- https://github.com/Triang3l/GoldSourceRebuild [GoldSource引擎重建]
- https://github.com/adriengivry/Overload
- https://github.com/flwmxd/MapleEngine
- https://github.com/inanevin/LinaEngine
- https://github.com/storm-devs/storm-engine
- https://github.com/minetest/minetest
- https://github.com/godotengine/godot
- https://github.com/ScriptedSnark/reGS
- https://github.com/nem0/LumixEngine
- https://github.com/urho3d/Urho3D
- https://github.com/KorokEngine/Korok [高朗]
- https://github.com/BoomingTech/Pilot
- https://github.com/Sirkles/JoshoEngine-Native
- https://github.com/ExplosionEngine/爆炸
- https://github.com/danhuynh0803/Campfire
- https://github.com/lowenware/dotrix [生锈]
- https://github.com/bevyengine/bevy [铁锈]
- https://github.com/FyroxEngine/Fyrox [生锈]
- https://github.com/AbyssEngine/AbyssEngine [ARPG]
- https://github.com/skylicht-lab/skylicht-engine
- https://github.com/ValveSoftware/halflife [半条命 1]
- https://github.com/SamVanheer/halflife-unified-sdk [半条命 SDK]
- https://github.com/MonoGame/MonoGame [.NET]
- https://github.com/nCine/nCine [2D]
- https://github.com/gameplay3d/gameplay [2D/3D]
- https://github.com/turbulenz/turbulenz_engine [HTML5]
- https://github.com/egret-labs/egret-core [HTML5]
- https://github.com/TorqueGameEngines/Torque2D [2D]
- https://github.com/TorqueGameEngines/Torque3D [3D]
- https://github.com/PardCode/CX3D [3D]
- https://github.com/TrinityCore/TrinityCore [MMORPG]
- https://github.com/solenum/exengine [C99 3D]
- https://github.com/TheCherno/Hazel
- https://github.com/duddel/yourgamelib
- https://github.com/Serious-Engine/Base
- https://github.com/benanil/Castle-Engine [DX11]
- https://github.com/OpenArena/engine [地震3]
- https://github.com/rbfx/rbfx [C# 支持和所见即所得编辑器]
- https://github.com/BobbyAnguelov/Esoterica
- https://github.com/ZDoom/gzdoom [厄运]
- https://github.com/L-Spiro/L.-Spiro-Engine-2022
- https://github.com/MohitSethi99/ArcEngine
- https://github.com/gscept/星云
- https://github.com/irisengine/iris [跨平台C++]
- https://github.com/WistfulHopes/NightSkyEngine [一个用虚幻引擎5编写的格斗游戏引擎]
- https://github.com/ObEngine/ObEngine [2D+Lua]
- https://github.com/harukumo/HorizonEngine [3D渲染引擎]
游戏引擎插件:Unreal
- UE4 插件,用户 Rider for Unreal Engine 作为代码编辑器
- 用于在虚幻引擎中编写游戏流程脚本的设计不可知节点系统
- 包含 Dear ImGui 的示例虚幻引擎 5.0.1 C++ 项目
- 一组用于使用 ImGui 的虚幻引擎项目的工具和实用程序
- 一个简单的虚幻引擎子系统,为客户提供更准确的服务器世界时间
- UE4 UI 纹理验证器插件
- 虚幻引擎 .NET 6 集成
- 用于虚幻引擎的 Houdini 引擎插件
- 关于从 UnrealEngine 到磁盘捕获带有语义注释的图像的小型教程存储库
- live2d模型的UE4插件
- 向引擎添加自定义资产类型和编辑器的虚幻引擎代码插件
- 用于 Lua API 实现的虚幻引擎 4 插件
- UnrealEngine4 的调试菜单
- “亲爱的 Imgui”远程访问库和应用程序
游戏引擎插件:Unity
游戏引擎插件:Lumix
游戏引擎检测器
数学
- https://github.com/nfrechette/rtm
- https://github.com/Groovounet/glm
- https://github.com/microsoft/DirectXMath
- https://github.com/Kazade/kazmath
- https://github.com/milakov/int_fastdiv
- https://github.com/freemint/fdlibm
- https://github.com/Jaysmito101/cgl
渲染器
- https://github.com/keith2018/SoftGLRender
- https://github.com/DQLin/VolumetricReSTIRRelease
- https://github.com/HackerPoet/NonEuclidean
- 设计用于在 CPU 上的单线程上运行的图形引擎
- https://github.com/paroj/gltut [OpenGL 渲染]
- https://github.com/ashawkey/raytracing [光线追踪器]
- https://github.com/crosire/reshade [用于游戏和视频软件的通用后处理注入器]
- https://github.com/harukumo/HorizonEngine [3D渲染引擎]
- https://github.com/Patryk27/strolle [实时渲染引擎]
3D图形
人工智能
图像编解码器
- https://github.com/nothings/stb
- https://github.com/libjpeg-turbo/libjpeg-turbo
- https://github.com/erkkah/tigr
波前对象
任务调度器
游戏网
指导
- https://github.com/MFatihMAR/Game-Networking-Resources
- https://partner.steamgames.com/doc/api/ISteamNetworkingMessages#functions_sendrecv [蒸汽]
- https://github.com/mcxiaoke/mqtt [mqtt]
来源
- https://github.com/cloudwu/skynet
- https://github.com/ketoo/NoahGameFrame [服务器引擎]
- https://github.com/chronoxor/CppServer
- https://github.com/Qihoo360/evpp
- https://github.com/ValveSoftware/GameNetworkingSockets [蒸汽]
- https://github.com/skywind3000/kcp【KCP】
- https://github.com/Unit-X/kcp-cpp [KCP]
- https://github.com/TLeonardUK/ds3os [黑暗之魂 3]
- https://github.com/TLeonardUK/ds2os [黑暗之魂 2]
- https://github.com/rathena/rathena [大型多人在线角色扮演游戏]
- https://github.com/uNetworking/uWebSockets [网络套接字]
- https://github.com/socketio/socket.io [节点]
- https://github.com/mqttjs/MQTT.js [mqtt nodejs]
- https://github.com/eclipse/paho.mqtt.cpp [mqtt cpp]
- https://github.com/topfreegames/pitaya [服务器框架]
- https://github.com/azerothcore/azerothcore-wotlk [魔兽世界服务器]
- https://github.com/arlyon/azerust [WOW 的 Rust 服务器]
- https://github.com/arlyon/awesome-wow-rust [WOW 的 Rust 服务器]
- https://github.com/2601677867/One-Click-Run_Source_Server [源引擎服务器]
PhysX SDK
- https://github.com/NVIDIAGameWorks/PhysX
- https://github.com/NVIDIAGameWorks/PhysX-3.4
- https://github.com/bulletphysics/bullet3
游戏开发
指导
- https://github.com/Calinou/awesome-gamedev
- https://github.com/notpresident35/learn-awesome-gamedev
- https://github.com/yrgo/awesome-educational-games
- https://github.com/raizam/gamedev_libraries [gamedev 的开源 c/c++ 库集合]
- https://github.com/gheja/game-design-documents [游戏设计文档]
- https://github.com/Kavex/GameDev-Resources [游戏开发资源]
- https://github.com/crazyshader/GameDev [统一]
- https://github.com/RyanNielson/awesome-unity [统一]
- https://github.com/QianMo/Unity-Design-Pattern [统一设计]
来源
- https://github.com/PiMoNFeeD/csgo-src [泄露的 CSGO]
- https://github.com/perilouswithadollarsign/cstrike15_src [使用 CI 泄露的 CSGO]
- https://github.com/SwagSoftware/Kisak-Strike [开源 CSGO]
- https://github.com/hampta/csso-src [CSGO 模组]
- https://github.com/thomaseichhorn/cs16-client [重写了 CS1.6]
- https://github.com/s1lentq/ReGameDLL_CS [反向 CS1.6]
- https://github.com/td512/re3 [逆转侠盗猎车手3,罪恶都市]
- https://github.com/SmileyAG/ReCZDS [反向 CZeror]
- https://github.com/Harrison1/unrealcpp [UE4 C++ 示例]
- https://github.com/QianMo/UE4-FPS-Game [UE4 FPS游戏]
- https://github.com/KitchenGun/UE4_FPS [UE4 FPS 演示]
- https://github.com/tomlooman/SimpleFPSTemplate [UE4 FPS 演示]
- https://github.com/tomlooman/EpicSurvivalGame [UE4 FPS 游戏]
- https://github.com/QianMo/UE4-Tank-Game【UE4游戏】
- https://github.com/gmh5225/UE-UE5-FPS-wlaster [UE5 FPS游戏]
- https://github.com/gmh5225/UE5-FPS-CryptRaider [UE5 FPS游戏]
- https://github.com/LeroyTechnologies/ProjectM [UE5 FPS游戏]
- https://github.com/invi1998/MultiplayerBlasterGame [UE5 FPS游戏]
- https://github.com/perfect-hand/ue5-cardgame【UE5卡牌游戏】
- https://github.com/stackOverflower92/FightingGame-UE5【UE5格斗游戏】
- https://github.com/tomlooman/ActionRoguelike【UE Roguelike游戏】
- https://github.com/Unity-Technologies/FPSSample [统一游戏]
- https://github.com/OguzKaira/FPS-Movement [Unity FPS]
- https://github.com/OguzKaira/SQLite-Unity3D [Unity SQLite]
- https://github.com/swordjoinmagic/MoBaDemo【Unity MoBa】
- https://github.com/mytechnotalent/unity-vrchat-template [Unity VRChat 模板]
- https://github.com/Saukiya/Arknights [Unity 明日方舟]
- https://github.com/ZehMatt/SnakeRoyal [带服务器的小游戏]
- https://github.com/MKXJun/Super-Fighter【DX11小游戏】
- https://github.com/MKXJun/魔方【DX9/11小游戏】
- https://github.com/Suprcode/mir2 [MIR2]
- https://github.com/Suprcode/mir3-锆石 [MIR3]
- https://github.com/WolfireGames/overgrowth [过度生长]
- https://github.com/solidi/hl-mods [半条命修改]
- https://github.com/codingben/maple-fighters【一款类似冒险岛的小网游】
- https://github.com/loqix/堡垒之夜 [堡垒之夜]
- https://github.com/bradharding/doomretro [DOOM]
- https://github.com/Luxon98/Super-Mario-Bros-game [超级马里奥重制版]
- https://github.com/plibather8/2048.cpp [2048]
- 过山车大亨 2 的开源重新实现
- 这是旧的 Paradise SPRX BO2 源代码
- https://github.com/dreamstalker/rehlds [逆向工程 HLDS]
- https://github.com/AndroidModLoader/AndroidModLoader [安卓模组加载器]
- https://github.com/marblexu/PythonPlantsVsZombies [植物大战僵尸]
- https://github.com/Fewnity/Counter-Strike-DS-Unity-Project [Unity CS]
- https://github.com/Fewnity/Counter-Strike-Nintendo-DS [任天堂 CS]
- https://github.com/ppy/osu [osu]
- https://github.com/ppy/osu-framework [osu]
- https://github.com/dufernst/LegionCore-7.3.5 [哇]
- https://github.com/RageProject/5.4.7-Wow-source [哇]
- https://github.com/SkyFire/MopCore547 [哇]
- https://github.com/skMetinek/Non-Newtonian-New-York [蜘蛛侠重制版]
- https://github.com/playgameservices/cpp-android-basic-samples [使用 Google Play 游戏 C++ SDK 的示例游戏]
- https://github.com/pafuhana1213/KawaiiPhysics [UnrealEngine4 & 5 的简单假物理]
- https://github.com/pafuhana1213/VTuberWithUE4 [UE4 VTuber]
- https://github.com/Bratah123/GojoTheSpire [杀戮尖塔修复版]
- https://github.com/snesrev/zelda3 [Zelda 3 的重新实现]
- https://github.com/kantam5/DeadByDaylight [黎明杀机副本]
- https://github.com/Phobos-developers/Phobos [红色警戒2:尤里的复仇引擎扩展]
- https://github.com/praydog/AutomataMP [尼尔]
- https://github.com/xinyu-evolutruster/3D-Racing-Game【一款基于OpenGL的赛车游戏】
- https://github.com/ProjectBorealis/PBCharacterMovement [用 C++ 实现的 UE4 的 HL2 风格、经典 FPS 运动]
- https://github.com/Merisho/tx-holdem【JS制作的德州扑克】
- https://github.com/raysan5/raylib [一个简单易用的库来享受视频游戏编程]
- https://github.com/NotYetGames/WarriOrb [使用 UE4 的类似黑暗之魂的动作平台游戏]
- https://github.com/pjasicek/OpenClaw [Captain Claw (1997) 平台游戏的重新实现]
游戏资产
- https://github.com/Miziziziz/Retro3DGraphicsCollection
- https://github.com/HitmanHimself/GOWTool [战神2018]
- https://github.com/KhronosGroup/glTF [运行时 3D 资产交付]
- https://github.com/syoyo/tinygltf [仅标头 C++11 微型 glTF 2.0 库]
- https://github.com/atenfyr/UAssetGUI [查看和修改UE4游戏资产]
游戏热补丁
- https://github.com/腾讯/xLua
- https://github.com/腾讯/InjectFix
- https://github.com/focus-creative-games/hybridclr
游戏测试
- https://github.com/UnityTech/GamesTestAutomationExample [关于如何在游戏中进行测试自动化的收集想法]
- https://github.com/nowsprinting/UnityAutomatedQAExamples [Unity 自动化 QA 指南]
- https://github.com/AirtestProject/Airtest【UI自动化框架】
- https://github.com/dendibakh/perf-ninja【性能分析】
- https://github.com/CookiePLMonster/UptimeFaker [检测高 PC 正常运行时间]
- https://github.com/GameTechDev/PresentMon [图形性能]
- https://github.com/gatling/gatling [服务器测试]
- https://github.com/aristocratos/btop [性能监视器]
- https://github.com/Celtoys/Remotery [实时 CPU/GPU 分析器]
- https://github.com/Volkanite/Push [监控 GPU/CPU/RAM 性能]
- https://github.com/google/orbit [C/C++ 性能分析器]
- https://github.com/wolfpld/tracy [C++ 框架分析器]
- https://github.com/RomanceTheHeart/Automation_Examples [在 Unreal 编辑器中自动执行某些任务]
- https://github.com/DaedalicEntertainment/ue4-test-automation [促进使用 Unreal Engine 4 Gauntlet 设置集成测试套件]
- https://github.com/DenuvoSoftwareSolutions/Onlooker [收集和可视化进程树内存使用情况的工具]
- https://github.com/milostosic/rprof [基于 CPU 范围的分析库]
游戏工具
- 在无边框窗口中玩您最喜爱的游戏;不再需要耗时的 alt-tabs
- https://github.com/Genymobile/scrcpy [显示和控制您的 Android 设备]
- https://github.com/ryanjon2040/Unreal-Binary-Builder [构建UE源]
- https://github.com/ryanjon2040/UnrealNetworkProfiler [UE 网络分析器]
- 用于获取最新或特定版本 Unity 的下载 URL 的命令行工具
- https://github.com/recastnavigation/recastnavigation [游戏导航网格工具集]
游戏经理
游戏CI
Web3 游戏
区块链指南
游戏
- https://github.com/aakarkun/unity-web3-skyrim-market [Web3 SkyRim 市场 - Unity]
开发工具包
安全
- https://github.com/SunWeb3Sec [让我们让 Web3 更安全]
- https://github.com/crytic [区块链安全,@trailofbits]
- https://github.com/crytic/building-secure-contracts [编写安全智能合约的指南和培训材料]
- https://github.com/crytic/etheno【以太坊安全分析与测试】
- https://github.com/crytic/echidna [以太坊智能合约模糊器]
- https://github.com/secureum/DeFi-Security-Summit-Stanford【DEFI聚焦智能合约安全夺旗】
- https://github.com/go-outside-labs/blockchain-hacking [黑客攻击]
直接X
指导
- https://github.com/planetchili/hw3d [C++ 3D DirectX 教程]
- https://github.com/jpvanoosten/LearningDirectX12 [DX12]
- https://github.com/PAMinerva/LearnDirectX [DX12]
- https://github.com/MKXJun/DirectX11-With-Windows-SDK [DX11 zh]
- https://github.com/d3dcoder/d3d12book [DX12]
- https://github.com/pkurth/D3D12Renderer [DX12]
钩
- https://github.com/rdbo/DX11-BaseHook [DX11 Imgui]
- https://github.com/DrNseven/D3D12-Hook-ImGui [DX12 Imgui]
- https://github.com/niemand-sec/DirectX11Hook [DX11 Imgui]
- https://github.com/guided-hacking/GH_D3D11_Hook [DX11]
- https://github.com/gogo9211/Discord-Overlay-Hook [DX11]
- https://github.com/ocornut/imgui/commit/923bd2fd217c1dc1e75fa92b0284d3817904988b [DX11/12 ResizeBuffers]
- https://github.com/marlkiller/d3dhook_imgui [d3d opengl hook imgui x86/x64]
- 基于 D3D9-D3D12、OpenGL 和 Vulkan 的游戏的通用图形挂钩
- https://github.com/jmpews/Dobby [一个轻量级、多平台、多架构的钩子框架]
- https://github.com/Sh0ckFR/Universal-Dear-ImGui-Hook [通用的 Dear ImGui Hook]
工具
- https://github.com/visotw/3d9 [修复 DX11 游戏中损坏的立体效果]
仿真
兼容性
- https://github.com/CnCNet/cnc-ddraw [老游戏]
- https://github.com/microsoft/D3D9On12 [Direct3D9-On-12 映射层]
覆盖
OpenGL
指导
欺骗
指导
- https://github.com/dsasmblr/game-hacking
- https://github.com/dsasmblr/hacking-online-games
- https://github.com/kovidomi/game-reversing
- https://github.com/TheZong/Game-Hacking
- https://github.com/mytechnotalent/Reverse-Engineering
- https://github.com/wtsxDev/reverse-engineering
- https://github.com/mytechnotalent/Hacking-Windows
- https://github.com/kotae4/intro-to-gamehacking
- https://blog.can.ac/author/can1357
- https://github.com/SinaKarvandi/Hypervisor-From-Scratch [管理程序]
- https://secret.club
- https://back.engineering
- https://vollragm.github.io
- https://www.triplefault.io
- https://kotae4.github.io
- https://bright.engineer
- https://www.unknowncheats.me
- https://forum.ragezone.com
- https://guidedhacking.com
- https://github.com/guided-hacking
- https://gamehacking.academy
- https://github.com/GameHackingAcademy
- https://areweanticheatyet.com [使用反作弊的游戏列表]
- https://github.com/imadr/Unity-game-hacking [统一]
- https://vollragm.github.io/posts/unity-reversing [统一]
- https://wiki.cheatengine.org/index.php?title=Mono [CE Mono]
- https://github.com/krampus-nuggets/ce-tutorial [CE]
- https://il2cppdumper.com [IL2CPP]
- https://www.unknowncheats.me/forum/unity/465283-il2cppruntimedumper.html [IL2CPP]
- https://github.com/shalzuth/NativeNetSharp [注入 C# 代码]
- https://github.com/januwA/game-reversed-study [CE指南zh]
- https://github.com/csgohacks/master-guide [CSGO攻略]
- 不同方式挂钩[挂钩指南]
- http://pwnadventure.com [可破解游戏]
- https://github.com/GameCrashProject/UE4-Hacking-Guideline [虚幻]
- https://github.com/TimMisiak/WinDbgCookbook [WinDbg]
- https://github.com/anhkgg/awesome-windbg-extensions [WinDbg]
- 未被发现的作弊引擎
- 远程Windows内核调试指南
调试
- https://github.com/stars/gmh5225/lists/debugger [列表]
- https://github.com/cheat-engine/cheat-engine
- https://github.com/SinaKarvandi/Hypervisor-From-Scratch [管理程序]
- https://github.com/JasonGoemaat/CheatEngineMonoHelper [CE Mono Helper]
- https://github.com/DoranekoSystems/frida-ceserver [IOS 的 CE 服务器]
- https://github.com/isabellaflores/ceserver-pcileech [Pcileech 的 CE 服务器]
- https://github.com/user23333/veh [Manualmap VEH Dll 的 CE 插件]
- https://github.com/x64dbg/x64dbg
- https://github.com/marakew/syser
- https://github.com/noword/GDB-Windows-Binaries [GDB]
- https://github.com/ajkhoury/ReClassEx
- https://github.com/ReClassNET/ReClass.NET
- https://github.com/x64dbg/DotX64Dbg
- https://github.com/imugee/xdv
- https://github.com/eteran/edb-debugger [适用于 Linux]
- https://github.com/korcankaraokcu/PINCE [适用于 Linux]
- https://github.com/mrexodia/TitanHide
- https://github.com/Air14/HyperHide
- https://github.com/HyperDbg/HyperDbg
- https://github.com/3526779568/vt-debuger
- https://github.com/changeofpace/Force-Page-Protection [绕过重映射内存]
- https://github.com/icsharpcode/ILSpy [对于统一]
- https://github.com/dnSpy/dnSpy [对于统一]
- https://github.com/HolLy-HaCKeR/dnSpy.Extension.HolLy [对于 Unity]
- https://github.com/mandiant/dncil [对于统一]
- https://github.com/hugsy/CFB [监控IRP]
- https://github.com/Kharos102/IOCTLDump [监控IRP]
- https://ioninja.com/downloads.html [协议分析器]
- https://github.com/wilszdev/SteamAntiAntiDebug [蒸汽]
- https://github.com/H5GG/H5GG【IOS作弊引擎】
数据包嗅探器和过滤器
- https://github.com/WPO-Foundation/win-shaper
- https://github.com/wiresock/ndisapi
- https://github.com/Akebi-Group/Akebi-PacketSniffer
- https://github.com/basil00/Divert [数据包转移]
数据包捕获和解析
极速黑客
重新工具
- https://dogbolt.org
- https://github.com/mentebinaria/retoolkit [逆向工程师的工具包]
- https://github.com/stevemk14ebr/RETools
- https://github.com/BataBo/ACEPatcher [.NET 补丁程序]
- https://github.com/waryas/KACE [使用自上下文映射或独角兽在 RING3 中模拟驱动程序]
- https://github.com/VollRagm/PTView [在 Windows 上浏览页表]
- https://github.com/iBotPeaches/Apktool [Apk]
- https://github.com/guided-hacking/GH-Offset-Dumper [扫描签名和网络变量并转储它们的相对偏移量]
- https://github.com/guided-hacking/GH-Entity-List-Finder [扫描游戏进程寻找最可能的实体列表地址]
- https://github.com/rednaga/APKiD [适用于 Android 的 PEiD]
- https://github.com/Col-E/Recaf [Java]
- https://github.com/tomvita/SE-tools [任天堂开关]
- https://github.com/StudentBlake/XCI-Explorer [XCI 资源管理器]
- https://github.com/Anonym0ose/JitDumper [CIL 方法 body dumper]
- https://github.com/cfig/Android_boot_image_editor [Android ROM 镜像逆向工程工具]
- https://github.com/hasherezade/pe-bear [PE 查看器]
- https://github.com/zodiacon/TotalPE2 [PE 查看器]
修复 VMP
修复 OLLVM
动态二进制检测
- https://github.com/hzqst/unicorn_pe
- https://github.com/googleprojectzero/TinyInst
- https://github.com/revsic/cpp-veh-dbi
- https://github.com/bitdefender/river
- https://github.com/beehive-lab/mambo [ARM]
- https://github.com/DynamoRIO/drmemory
- https://github.com/aroxby/dynre-x86
启动器滥用者
绕过 PatchGuard
- https://github.com/armasm/EasyAntiPatchGuard
- https://github.com/9176324/鲨鱼
- https://github.com/hfiref0x/UPGDSED [文件]
- https://github.com/Mattiwatti/EfiGuard [EFI]
- https://github.com/zzhouhe/PG1903【演示NX】
- https://gist.github.com/gmh5225/0a0c8e3a2d718e2d6f9b6a07d5e0f80a [PG CTX]
- https://github.com/gmh5225/QuickPGTrigger【压力测试】
- https://github.com/tandasat/Sushi [监控PG]
- https://github.com/gmh5225/Disabling-Hyper-V [禁用 Hyper-V]
Windows 内核资源管理器
- https://github.com/NullArray/WinKernel-Resources [指南]
- https://github.com/supermanc88/Document/tree/master/Windows%20Driver%20Development [指南]
- https://github.com/gmh5225/ntoskrnl_file_collection [各种版本的ntoskrnl文件]
- https://github.com/gmh5225/win32k_file_collection【各种版本的win32k文件】
- https://github.com/gmh5225/win32k_file_collection2 [各种版本的win32k文件]
- https://github.com/Arquivotheca/WinNT5_src_20201004 [泄露的 Windows XP 源代码]
- https://github.com/BlackINT3/OpenArk [工具]
- https://github.com/progmboy/openprocmon [开源进程监视器]
- https://github.com/winsiderss/systeminformer [工具]
- https://github.com/0xcpu/ExecutiveCallbackObjects [回调]
- https://github.com/0xcpu/WinAltSyscallHandler [AltSystemCallHandlers]
- https://github.com/everdox/InfinityHook [ETW 挂钩]
- https://github.com/FiYHer/InfinityHookPro [ETW Hook Ex]
- https://github.com/gmh5225/ETWHOOK-InfinityHookClass [ETW Hook Ex]
- https://github.com/DearXiaoGui/InfinityHookPro-main【ETW Hook WIN11】
- https://github.com/KelvinMsft/ThreadSpy [PMI 回调]
- https://github.com/KelvinMsft/PerfMon [PMI 回调]
- https://github.com/gmh5225/PMI-hpc [PMI]
- https://github.com/intelpt/WindowsIntelPT [英特尔 PT]
- https://github.com/CristiNacu/ingsoc [英特尔 PT]
- https://github.com/DProvinciani/pt-detector [英特尔 PT]
- https://github.com/googleprojectzero/winafl [英特尔 PT 模糊器]
- https://github.com/intelpt/winipt [ipt.sys]
- https://github.com/intelpt/processor-trace [英特尔 PT 解码器]
- https://github.com/gmh5225/Driver-intel-PEBs-LoopHPCs [英特尔 PEB]
- https://github.com/ilovecsad/Ark [工具]
- https://github.com/gmh5225/ntoskrnl_file_collection [Ntoskrnl 版本]
- https://github.com/gmh5225/win32k_file_collection [Win32k版本]
- https://github.com/gmh5225/win32k_file_collection2 [Win32k 版本]
- https://github.com/gmh5225/MSSymbolsCollection [内核符号]
- https://github.com/am0nsec/wkpe [枚举 VAD]
- https://github.com/armvirus/DriverDllFInder【查找驱动无用内存】
- https://github.com/MahmoudZohdy/APICallProxy [Windows API调用混淆]
- https://github.com/Spuckwaffel/Simple-MmcopyMemory-Hook [挂钩MmcopyMemory]
- https://github.com/VollRagm/PTView [在 Windows 上浏览页表]
- https://github.com/misc0110/PTEditor【PT编辑器】
- https://github.com/IcEy-999/Ntoskrnl_Viewer [Ntoskrnl 查看器]
- https://github.com/ekknod/Nmi [阻止NMI中断]
- https://github.com/EquiFox/KsDumper [利用内核空间的力量转储进程]
- https://github.com/not-matthias/Nemesis [利用内核空间的力量转储进程]
- https://github.com/allogic/KDBG [工具]
- https://github.com/gmh5225/Voyager [适用于 Windows 10 x64(AMD 和英特尔)的 Hyper-V 黑客框架]
- https://github.com/repnz/apc-research [APC 内部研究代码]
- https://github.com/intel/pcm [处理器计数器监视器]
- https://github.com/ChengChengCC/Ark-tools [一些内核研究]
- https://github.com/alal4465/KernelMon [监控Windows内核驱动]
- https://github.com/gmh5225/Practical-Reverse-Engineering-Solutions [DPC+APC]
- https://github.com/br-sn/CheekyBlinder [使用签名的易受攻击的驱动程序枚举和删除内核回调]
- https://github.com/GetRektBoy724/DCMB [删除内核回调]
魔术师
- https://github.com/PShocker/Zygisk-MagiskHide
- https://github.com/longpoxin/hideroot
- https://github.com/canyie/Riru-MomoHider
- https://github.com/newbit1/rootAVD [根 AVD]
- https://github.com/Fox2Code/FoxMagiskModuleManager [Magisk 的模块管理器]
安卓文件资源管理器
- https://github.com/nzcv/note [指南-zh]
- https://github.com/iBotPeaches/Apktool
- https://github.com/pxb1988/dex2jar
- https://github.com/skylot/jadx [Dex 到 Java 反编译器]
- https://github.com/LuckyPray/DexKit-Android [dex 去混淆器]
- https://github.com/rednaga/APKiD [适用于 Android 的 PEiD]
安卓内存资源管理器
- https://github.com/misc0110/PTEditor【PT编辑器】
- https://github.com/joaomlneto/procmap
- https://github.com/kp7742/MemDumper [转储]
- https://github.com/mrcang09/Android-Mem-Edit
- https://github.com/ExploitTheLoop/writemem
- https://github.com/abcz316/rwProcMem33【Linux读写进程内存模块】
- https://github.com/IAIK/armageddon [对 ARM 的缓存攻击]
- https://github.com/tamirzb/CVE-2021-1961 [CVE RW]
- https://github.com/MJx0/KittyMemory [运行时代码修补]
安卓内核资源管理器
- https://docs.kernel.org [Linux 内核文档]
- https://armv8-ref.codingbelief.com/en [ARMv8-A 的 ARM 架构参考手册]
- https://github.com/yhnu/op7t [DIY内核]
- https://github.com/yabinc/simpleperf_demo [性能]
- https://github.com/feicong/android_ebpf [EBPF]
- https://github.com/cloudfuzz/android-kernel-exploitation [安卓内核漏洞利用]
IOS越狱
- https://github.com/jjolano/shadow
- https://github.com/gmh5225/IOS-jailbreak--Fugu15
- https://github.com/Kc57/iHide
- https://github.com/palera1n/palera1n
虚拟环境
- https://github.com/FBlackBox/BlackBox [安卓]
- https://github.com/mandiant/flare-vm
- https://github.com/hzqst/VmwareHardenedLoader
反编译器
- IDA专业版
- 二进制忍者
- https://github.com/NationalSecurityAgency/ghidra
- https://github.com/avast/retdec
- https://github.com/Col-E/Recaf [Java]
- https://github.com/Konloch/bytecode-viewer [Java]
- https://github.com/java-deobfuscator/deobfuscator [Java]
- https://github.com/angr/binsync [同步]
- https://github.com/crytic/ethersplay [EVM 反汇编器]
IDA 插件
- https://github.com/vmallet/ida-plugins [IDA插件列表]
- https://github.com/onethawt/idaplugins-list [IDA 插件列表]
- https://github.com/zyantific/IDASkins [皮肤]
- https://github.com/endofunky/ida-nord-theme [皮肤]
- https://github.com/giladreich/ida_migrator [迁移数据库]
- https://github.com/can1357/NtRays [Windows内核增强]
- https://github.com/JustasMasiulis/ida_bitfields [Windows 内核增强]
- https://github.com/VoidSec/DriverBuddyReloaded [Windows内核分析]
- https://github.com/jhftss/IDA2Obj [COFF 重新链接]
- https://github.com/synacktiv/dotNIET [导入 .NET 符号]
- https://github.com/aliyunav/Finger【云端识别功能】
- https://github.com/FelixBer/FindFunc [通过模式识别函数]
- https://github.com/kweatherman/sigmakerex [签名机]
- https://github.com/Mixaill/FakePDB [IDA 生成 PDB]
- https://github.com/illera88/Ponce [符号执行]
- https://github.com/airbus-cert/ttddbg [时间旅行调试]
- https://github.com/P4nda0s/LazyIDA [LazyIDA]
- https://github.com/quarkslab/qsynthesis [适用于汇编指令反混淆的 Greybox 合成器]
- https://github.com/medigateio/ida_medigate [RTTI]
- https://github.com/OALabs/findyara-ida [亚拉]
- https://github.com/therealdreg/ida_vmware_windows_gdb [IDA+VMWARE+GDB]
- https://github.com/therealdreg/ida_bochs_windows [IDA+BOCHS]
- IDA 和 VS Code 的集成,连接两者以轻松执行和调试 IDAPython 脚本
- https://github.com/binarly-io/efiXplorer [UEFI 固件]
- https://github.com/Accenture/protobuf-finder [Protobuf]
- https://github.com/strazzere/golang_loader_assist [逆向]
- https://github.com/GregoryMorse/GhidraDec [Ghidra 反编译器]
- https://github.com/AntoineBlaud/EasyRe [跟踪执行]
- https://github.com/flatz/ida_ps5_elf_plugin [PS5 精灵加载器]
- https://github.com/gaasedelen/tenet [执行痕迹]
- https://github.com/polymorf/findcrypt-yara [查找加密常量]
- https://github.com/anatolikalysch/VMAttack [IDA Pro 的 VMAttack 插件]
- https://github.com/cseagle/sk3wldbg [独角兽]
- https://github.com/RicBent/Classy [管理课程]
- https://github.com/archercreat/ida_names [用当前函数名重命名伪代码窗口]
- https://github.com/helpsystems/turbodiff [差异]
- https://github.com/gmh5225/IDA-diaphora [差异]
- 一个 IDAPython 模块,用于更方便地逆向工程 iOS 内核缓存
- https://gitlab.com/eshard/d810【反编译时通过修改IDA Pro微码对代码进行反混淆】
- https://github.com/airbus-seclab/AutoResolv [解析从外部库导入的函数]
- https://github.com/snare/ida-efiutils [EFI 二进制文件]
- https://github.com/JusticeRage/Gepetto [ChatGPT]
- https://github.com/MayerDaniel/ida_gpt [ChatGPT]
- https://github.com/mahaloz/DAILA [ChatGPT]
- https://github.com/ke0z/VulChatGPT [ChatGPT]
- https://github.com/deadeert/EWS [仿真]
IDA 签名数据库
二进制忍者插件
- https://github.com/Vector35/official-plugins
- https://github.com/Vector35/community-plugins
- https://github.com/EliseZeroTwo/SEH-Helper [SEH 助手]
- https://github.com/Vector35/tanto [切片功能]
- https://github.com/ergrelet/triton-bn [海卫一]
- https://github.com/google/binexport [BinDiff]
- https://github.com/Pusty/BinaryNinjaPlugins
- https://github.com/borzacchiello/seninja [符号执行]
- https://github.com/yellowbyte/opaque-predicates-detective
- https://github.com/ex0dus-0x/fuzzable [模糊器]
- https://github.com/jmprdi/binja-division-deoptimization [除法和模解优化器]
- https://github.com/Vector35/OpaquePredicatePatcher [不透明谓词修补程序]
- https://github.com/jmprdi/binja-division-deoptimization [除法和模解优化器]
- https://github.com/mrphrazer/obfuscation_detection [查明混淆代码的脚本集合]
- 使用 Binary Ninja 和 Unicorn Engine 将二进制代码打包为 Python 类
- https://github.com/seeinglogic/ariadne【图分析】
- https://github.com/skr0x1c0/binja_kc [用于加载 MachO 内核缓存和 dSYM 文件的插件]
Ghidra 插件
- https://github.com/CENSUS/ghidra-frida-hook-gen
- https://github.com/Gekkio/GhidraBoy [Ghidra 的 Sharp SM83 / Game Boy 扩展]
- https://github.com/fmagin/ghidra-openai [ChatGPT]
- https://github.com/securityjoes/ThreatResearch [ChatGPT]
- https://github.com/evyatar9/GptHidra [ChatGPT]
- https://github.com/moyix/gpt-wpre [ChatGPT]
- https://github.com/pudii/gba-ghidra-loader [GameBoy]
- https://github.com/MEhrn00/Ghidra_COFFParser [COFF]
Windbg 插件
- https://github.com/comaeio/SwishDbgExt
- https://github.com/lowleveldesign/comon [跟踪 COM]
- https://github.com/bruce30262/TWindbg [WinDbg 的类 PEDA 调试器 UI]
- https://github.com/JKornev/cfgdump【分析Control Flow Guard图】
- https://github.com/yardenshafir/WinDbg_Scripts [WinDbg 脚本]
- https://github.com/long123king/dk【tokenext重构版】
- https://github.com/ch3rn0byl/WinDbg-Extensions [回调扩展]
X64DBG 插件
- https://github.com/x64dbg/x64dbg/wiki/Plugins
- https://github.com/horsicq/x64dbg-Plugin-Manager
- https://github.com/m417z/Multiline-Ultimate-Assembler
- https://github.com/x64dbg/Classroom
- https://github.com/VenTaz/Themidie
- https://github.com/Ahmadmansoor/x64dbgScript
- https://github.com/push0ebp/xMalHunter [检测恶意材料]
- https://github.com/morsisko/xFindOut
- https://github.com/jdavidberger/chaiScriptPlugin
- https://github.com/gmh5225/X64DBG-ViewDllNotification
- https://github.com/legendabrn/AutoAttach
- https://github.com/secrary/idenLib [生成签名]
- https://github.com/GregoryMorse/GhidraDec [Ghidra 反编译器]
- https://github.com/x64dbg/x64dbgbinja [二进制忍者]
- https://github.com/DNLINYJ/Anti_miHoYo_Jcc_Obfuscate
- https://github.com/mrexodia/DisableParallelLoader [禁用依赖项的并行加载]
- https://github.com/ElvisBlue/x64dbgpython [运行python3脚本]
- https://github.com/secrary/idenLibX【库函数标识】
- https://github.com/x64dbg/SlothBP [协作断点管理器]
- https://github.com/Kwansy98/ApiBreakpoint [Api 断点]
作弊引擎插件
- https://github.com/FreeER/CE-Extensions [Lua 扩展]
- https://github.com/Skyrimfus/CE-lua-extensions [Lua 扩展]
- https://github.com/bbfox0703/Mydev-Cheat-Engine-Tables [CT]
- https://github.com/inuNorii/Elden-Ring-CT-TGA [Elden Ring]
- https://github.com/vmmcall/remap-plugin [重新映射]
- https://github.com/vmmcall/overwatch-iat-fixer [守望先锋 IAT 修复程序]
- https://github.com/FreeER/CE-Examples [一些例子]
- 将ce的monodatacollector移植到android/ios
射入:Windows
- https://github.com/btbd/smap【散点图】
- https://github.com/btbd/modmap【扩展手动地图】
- https://github.com/KGB-1337/memmap【扩展手册地图】
- https://github.com/weak1337/ModExMap【扩展手动地图】
- https://github.com/mactec0/Kernelmode-manual-mapping-through-IAT【IAT手册映射】
- https://github.com/charliewolfe/Stealthy-Kernelmode-Injector【PTE/VAD操作手册图】
- https://github.com/wbenny/injdrv [APC]
- https://github.com/alexkrnl/Kernel-dll-injector [APC]
- https://github.com/w1u0u1/kinject [地图+APC]
- https://github.com/TheCruZ/Simple-Manual-Map-Injector [手册地图]
- https://github.com/andrew9382/manual_mapping_dll_injector【手册映射】
- https://github.com/danielkrupinski/MemJect【手册映射】
- https://github.com/can1357/ThePerfectInjector [PTE.User]
- https://github.com/estimated1337/executor [PTE.User]
- https://github.com/Nou4r/PresentInjector [PTE.User]
- https://github.com/JGonz1337/kernel-eac-be-injector [PTE.User]
- https://github.com/Cr4sh/KernelForge [劫持ROP]
- https://github.com/Compiled-Code/be-injector [攻击牛]
- https://github.com/ergrelet/dll-hot-reload [热重载]
- https://github.com/ExpLife0011/KeUserModeCallBack [KeUserModeCallBack]
- KeUserModeCallBack Win10
- https://github.com/YouNeverKnow00/Kernelmode-DLL-Injector【手册图】
- Windows内核模式驱动程序将dll注入每个进程并执行系统范围的函数挂钩
- https://github.com/Broihon/GH-Injector-Library [注入库和工具]
- https://github.com/5paceman/nightshade [注入工具]
- https://github.com/deepinstinct/Dirty-Vanity [RtlCreateProcessReflection]
注入:Linux
注入:Android
- https://github.com/SsageParuders/ModGamesByInjectZygote
- https://github.com/gmh5225/Android-DLL-Injector
- https://github.com/reveny/Android-Ptrace-Injector
- https://github.com/reveny/Android-LD-Preload-Injector
DLL劫持
- https://github.com/Sh0ckFR/DLLirant [劫持研究]
- https://github.com/redteamsocietegenerale/DLLirant [劫持研究工具]
- https://github.com/knight0x07/ImpulsiveDLLHijack [劫持研究]
- https://github.com/wietze/HijackLibs [跟踪公开披露的 DLL 劫持机会的项目]
- https://github.com/gmh5225/DLL-Hijack-ExportDumper【转储PE文件导出表】
- https://github.com/cyberark/DLLSpy【DLL劫持检测工具】
- 用于识别易受相对路径 DLL 劫持的可执行文件和 DLL 的项目
钩
- https://github.com/microsoft/Detours
- https://github.com/wbenny/DetoursNT
- https://github.com/stevemk14ebr/PolyHook
- https://github.com/stevemk14ebr/PolyHook_2_0
- https://github.com/WopsS/RenHook
- https://github.com/axhlzy/PyAsmPatch
- https://github.com/TupleDev/KDtour [轻松内核绕行]
- https://github.com/nelfo/PGHooker [页面保护]
- https://github.com/weak1337/SkipHook [跳过挂钩]
- https://github.com/0mdi/edgegdi_hook [gdi32 .data 交换]
- https://github.com/noobpk/frida-android-hook [frida hook for android]
- https://github.com/SamuelTulach/LightHook【跨平台钩子库】
ROP 查找器
- https://github.com/0vercl0k/rp
- https://github.com/JonathanSalwan/ROPgadget
- https://github.com/helpsystems/Agafi
- https://github.com/hugsy/ropgadget-rs
ROP生成
反签名扫描
转速
- https://github.com/btbd/access
- https://github.com/crvvdev/intraceptor [访问]
- https://github.com/juniorjacob/readwrite-kernel-stable
- https://github.com/DarthTon/Blackbone
- https://github.com/HoShiMin/Kernel-Bridge
- https://github.com/waryas/EUPMAccess
- https://github.com/waryas/UMPMLib
- https://github.com/EBalloon/Remap
- https://github.com/TheCruZ/EFI_Driver_Access [EFI RPM]
- https://github.com/SamuelTulach/efi-memory [EFI RPM]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/489305-read-write-process-attach.html
- https://www.unknowncheats.me/forum/anti-cheat-bypass/444289-read-process-physical-memory-attach.html
- https://github.com/gamozolabs/mempeek [Linux]
- https://github.com/SamuelTulach/meme-rw [kdmapper]
W2S
覆盖
- https://github.com/coltonon/D2DOverlay
- https://github.com/SeanPesce/Direct3D9-Overlay [DX9]
- https://github.com/Unkn0wnH4ck3r/GameOverlayUIHook [蒸汽]
- https://github.com/Xenia0/Steam-Hook-Render-PoC [蒸汽]
- https://github.com/xo1337/steam-overlay-x64 [蒸汽]
- https://github.com/Splitx12/StrongSteam [GDI + Steam]
- https://github.com/gmh5225/dwmhook [DWM]
- https://github.com/LoxTus/dwm-overlay [DWM]
- https://github.com/rlybasic/DWM_Hook [DWM]
- https://github.com/mfxiaosheng/dwmhook【DWM VFTable】
- https://github.com/iraizo/nvidia-overlay-hijack [劫持 Nvidia]
- https://github.com/Brattlof/D3DOverlay-Nvidia-Hijack [劫持 Nvidia]
- https://github.com/gmh5225/NVIDIA-OVERLAY [劫持Nvidia]
- https://github.com/es3n1n/nvidia-overlay-renderer [英伟达]
- https://github.com/muturikaranja/overlay [SetWindowsHookEx]
- https://github.com/gmh5225/OBS-graphics-hook32-Hook [OBS挂钩]
- https://github.com/plu1337/OBS-Hook【OBS挂钩】
- https://github.com/PierreCiholas/NotAnOverlay [与 GDI 复制]
- https://github.com/SsageParuders/Android_Native_Surface [Android 原生覆盖]
- https://github.com/xBrunoMedeiros/eac-overlay [EAC 覆盖]
- https://github.com/3r4y/imgui-external-overlay [imgui 覆盖]
- https://github.com/J0xna/Kernel-Overlay-Hider [内核覆盖隐藏器]
渲染/绘制
- https://github.com/vmcall/dxgkrnl_hook
- https://github.com/r1cky33/krnl-gdi-render [Dxgkrnl + GDI]
- https://github.com/BadPlayer555/KernelGDIDraw
- https://github.com/Splitx12/StrongSteam [GDI + Steam]
- https://github.com/Sentient111/KernelDrawing [从内核模式绘制,没有任何钩子]
- https://github.com/wbaby/DoubleCallBack [内核中的 DWM]
- https://github.com/gmh5225/DWM-DwmDraw [DWM StackWalk]
- https://github.com/Polarmods/PolarImGui [Android 上的 Imgui]
- https://github.com/LGLTeam/Android-Mod-Menu [适用于 Android 的浮动模组菜单]
- https://github.com/springmusk026/ImGui-Unity-With-Layout [统一的 Imgui]
- https://github.com/springmusk026/Imgui-Unity [统一的 Imgui]
- https://github.com/gmh5225/Android-Mod-Menu-ImGui [统一的 Imgui]
- https://github.com/Octowolve/Unity-ImGUI-Android [统一的 Imgui]
- https://github.com/lbertitoyt/ImGUI-Zygisk-Unity [统一的 Imgui]
- https://github.com/AKNoryx28/ImGui-Unity-Android [统一的 Imgui]
- https://github.com/VerityIncorporated/BepInEx-IL2CPPBase [IL2CPP 菜单]
- https://github.com/springmusk026/Android-Mod-Menu-Kotlin [IL2CPP 菜单]
- https://github.com/gmh5225/Android-OpenGL-ES-Chams [Chams]
- https://github.com/RequestFX/ImGUI-Advanced-Cheat-Menu [Imgui 菜单]
- https://github.com/xProHackerx/imgui-ios-mod-menu [IOS 的 Imgui 菜单]
- https://github.com/sy1ntexx/egui-d3d11 [菜单]
用户界面
易受攻击的驱动程序
- https://github.com/hacksysteam/HackSysExtremeVulnerableDriver [指南]
- https://github.com/xct/windows-kernel-exploits [指南]
- https://github.com/namazso/physmem_drivers [易受攻击的驱动列表]
- https://github.com/alfarom256/drivers_and_shit [易受攻击的驱动列表]
- https://github.com/NullArray/WinKernel-Resources/tree/main/Drivers [易受攻击的驱动列表]
- https://github.com/Xxmmy/vulnerable-driver-scanner [扫描易受攻击的驱动程序]
- https://github.com/Sentient111/VulnerableDriverScanner [扫描易受攻击的驱动程序]
- https://github.com/fengjixuchui/gdrv-loader/tree/1909_mitigation [gdrv.sys]
- http://rexw3wrz5pldtadf3hy4vqnuzokhco4l32kyntj36fcgpjuy3nvxidid.onion/_xeroxz/VDM [gdrv 增强]
- https://github.com/Compiled-Code/eac-mapper [gdrv.sys]
- https://github.com/gmh5225/CVE-2018-19320-LPE [gdrv.sys]
- https://github.com/gmh5225/CVE-2018-19320 [gdrv.sys]
- https://github.com/eddeeh/kdmapper [iqvw64e.sys]
- https://github.com/TheCruZ/kdmapper [iqvw64e.sys]
- https://github.com/Brattlof/kdmapper-1909 [iqvw64e.sys]
- https://github.com/rmccrystal/kdmapper-rs [Rust 的 kdmapper 库]
- https://github.com/kkent030315/MsIoExploit [MsIo64.sys]
- https://github.com/kkent030315/evil-mhyprot-cli [Mhyprot2.sys]
- https://github.com/leeza007/evil-mhyprot-cli [Mhyprot2.sys]
- https://github.com/keowu/mhyprot2 [Mhyprot2.sys]
- https://github.com/kagurazakasanae/Mhyprot2DrvControl [Mhyprot2.sys]
- https://github.com/Live-Hack-CVE/CVE-2020-36603 [Mhyprot2.sys]
- https://github.com/tanduRE/AvastHV [Avast]
- https://github.com/iPower/KasperskyHook [卡巴斯基]
- https://github.com/mathisvickie/CVE-2021-21551 [dbutil_2_3.sys]
- https://github.com/ch3rn0byl/CVE-2021-21551 [dbutil_2_3.sys]
- https://github.com/SpikySabra/Kernel-Cactus [dbutil_2_3.sys]
- https://github.com/mzakocs/CVE-2021-21551-POC [dbutil_2_3.sys]
- https://github.com/Splitx12/imxyviMapper [AsUpIO.sys]
- https://github.com/archercreat/vdk [Speedfan.sys]
- https://github.com/SamLarenN/SpeedFan-Exploit [Speedfan.sys]
- https://github.com/Gbps/CapcomLib [卡普空系统]
- https://github.com/es3n1n/dolboeb-executor [卡普空系统]
- https://github.com/Exploitables/CVE-2015-2291 [IQVW64.sys]
- https://github.com/KiFilterFiberContext/AsIO-Exploit [AsIO3.sys]
- https://github.com/IamM47Z/OpenHardwareMonitor-PoC [OpenHardwareMonitorLib.sys]
- https://github.com/RedCursorSecurityConsulting/PPLKiller [RTCore64.sys]
- https://github.com/ReCryptLLC/CVE-2022-42045 [amsdk.sys]
- https://github.com/gmh5225/CVE-2022-3699 [LenovoDiagnosticsDriver.sys]
- https://github.com/estimated1337/lenovo_mapper [LenovoDiagnosticsDriver.sys]
- https://github.com/kkent030315/CVE-2022-42046 [wfshbr64.sys]
司机沟通
- https://github.com/gmh5225/Driver-Communication-List
- https://github.com/EBalloon/Common-Registry [注册表回调]
- https://github.com/gmh5225/Common-Registry-Jmp-RCX [注册表回调]
- https://github.com/adrianyy/rw_socket_driver [套接字]
- https://github.com/zoand/BOOM [劫持 Beep.sys]
- https://github.com/hrt/read_write [劫持IRP]
- https://github.com/Barracudach/Swap-control-ioctl [劫持 IRP SpeedFan.sys]
- https://github.com/adspro15/km-um-communication
- https://github.com/Spuckwaffel/Kernel-Thread-Driver [线程]
- https://github.com/Astronaut00/DoubleDataPointer [双数据指针]
- https://github.com/btbd/access [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter]
- https://github.com/paradoxwastaken/Poseidon [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter]
- https://github.com/weak1337/EvCommunication [NtTokenManagerCreateFlipObjectReturnTokenHandle]
- https://github.com/stephenasuncionDEV/kaldereta [NtTokenManagerGetAnalogExclusiveTokenEvent]
- https://github.com/UCFoxi/Shared-FlushFileBuffers-Communication [FlushFileBuffers]
- https://github.com/Sinclairq/DataCommunication [NtCompareSigningLevels]
- https://github.com/ExpLife0011/NtCompareSigningLevel-hook [NtCompareSigningLevels]
- https://github.com/muturikaranja/AfdIrpCallDispatch [Afd.sys 中的 .data 指针挂钩]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/483093-vtable-kernel-function-hook-communication.html [NtUserMessageCall]
- https://github.com/EBalloon/MapPage [NtUserGetObjectInformation]
- https://github.com/Compiled-Code/eac-mapper [NtMapVisualRelativePoints]
- https://git.back.engineering/_xeroxz/NtWin32k [NtUserGetThreadState]
- https://github.com/sbsbsbssbsbs/boundcallback [KeRegisterBoundCallback]
- https://github.com/Skengdoo/DataPtrSwap-driver [NtSetCompositionSurfaceAnalogExclusive]
- https://github.com/xPasters/.data-ptr-swap [NtSetCompositionSurfaceAnalogExclusive]
- https://github.com/ryan-weil/ReadWriteDriver [NtUserSetSysColors]
- https://github.com/D3DXVECTOR2/NtUserUpdateWindowTrackingInfo [NtUserUpdateWindowTrackingInfo]
- https://github.com/KiFilterFiberContext/windows-software-policy [剪辑]
- https://github.com/gmh5225/Interep-Driver-Leak [NtGdiPolyPolyDraw]
- https://github.com/TupleDev/.data-ptr-driver [NtGdiPolyPolyDraw]
- https://github.com/JGonz1337/kernel-eac-be-comm [NtGdiPolyPolyDraw]
- https://github.com/NullTerminatorr/NullHook [NtDxgkGetTrackedWorkloadStatistics]
- https://github.com/SurgeGotTappedAgain/Data-Pointer-Swap [NtDCompositionSetChildRootVisual]
- https://github.com/SamuelTulach/NekoSwap [Win32kApiSetTable]
- https://github.com/Deputation/kernel_payload_comms [共享内存]
- https://github.com/Chase1803/UCMiraka-ValorantExternal [NtUserGetPointerProprietaryId]
- https://github.com/gmh5225/Comm-ImMiraclela [NtDxgkGetTrackedWorkloadStatistics/NtDxgkGetAvailableTrackedWorkLoadIndex]
- https://www.unknowncheats.me/forum/2976731-post45.html [IsWin32KSyscallFiltered]
- https://github.com/J0xna/Kernel-Overlay-Hider [NtMITPostWindowEventMessage]
- https://github.com/gmh5225/Eac-Injector-Driver [NtQueryIntervalProfile]
电喷驱动程序
- https://github.com/mrexodia/EfiCMake
- https://github.com/tandasat/MiniVisorPkg
- https://github.com/SamuelTulach/EasyUefi [GNU-EFI 的 Visual Studio 模板]
- https://github.com/btbd/umap【EFI手册图】
- https://github.com/ekknod/sumap【EFI手册图】
- https://github.com/ekknod/KiSystemStartupMeme [自定义 KiSystemStartup]
- https://github.com/SamuelTulach/efi-memory [RPM]
- https://github.com/TheCruZ/EFI_Driver_Access [RPM]
- https://github.com/SecIdiot/bootkit
- https://github.com/SamuelTulach/rainbow [HWID]
- https://github.com/firebitsbr/-彩虹---EFI [HWID]
- https://github.com/Kiaoee/Fortnite-EFI-External [堡垒之夜]
- https://github.com/ajkhoury/UEFI-Bootkit
- https://github.com/SamuelTulach/negativespoofer [HWID]
- https://github.com/SamuelTulach/EfiDump [转储]
- https://github.com/ekknod/Nmi [阻止NMI中断]
- https://github.com/ekknod/smm [Smm作弊]
- https://github.com/sa413x/UEFI-Bootloader [使用 UEFI 运行时驱动程序的简单映射器]
QEMU/KVM 作弊
- https://github.com/Qemu-Gang
- https://github.com/memflow/memflow-kvm
- https://github.com/MisterY52/apex_dma_kvm_pub
- https://github.com/SamuelTulach/BetterTiming [绕过 CPU 时序]
- https://github.com/batusan/Hardened-qemu [隐藏QEMU]
- https://github.com/zhaodice/qemu-anti-detection [隐藏QEMU]
- https://github.com/nyx-fuzz/QEMU-Nyx [英特尔-PT]
- https://github.com/doomedraven/Tools/blob/master/Virtualization/kvm-qemu.sh [QEMU 脚本]
- https://github.com/GlacierW/MBA [QEMU 恶意软件行为分析器]
- https://github.com/Qemu-Gang/Escape-from-TuxKov [EFT]
- https://github.com/LWSS/Ape-ex-Abominations [顶点]
- https://github.com/Qemu-Gang/QemuUnrealDumper-4.25 [QEMU 的 UE SDK 转储]
- https://github.com/panda-re/panda [架构中立动态分析平台]
葡萄酒
反截图
- https://github.com/KANKOSHEV/NoScreen [隐藏窗口]
- https://github.com/gmh5225/dwmhook [DWM]
- https://github.com/wongfei/wda_monitor_trick
恶搞堆栈
- https://github.com/mgeeky/ThreadStackSpoofer
- https://github.com/danielkrupinski/x86RetSpoof
- https://github.com/Apex-master/return-address-spoofing
- https://github.com/Peribunt/Exception-Ret-Spoofing
- https://github.com/Peribunt/Ret-欺骗
- https://github.com/WithSecureLabs/CallStackSpoofer
- https://github.com/Barracudach/CallStack-Spoofer
- https://github.com/frkngksl/NimicStack
- https://github.com/thesecretclub/callout-poc
- https://github.com/veryboreddd/Return-address-spoofer
- https://www.unknowncheats.me/forum/anti-cheat-bypass/512002-x64-return-address-spoofing.html
- https://github.com/Kudaes/Unwinder [线程堆栈欺骗的另一种方法]
- https://github.com/klezVirus/SilentMoonwalk [真正的调用堆栈欺骗]
隐藏
- https://github.com/JKornev/hidden
- https://github.com/sina85/hide-file【隐藏文件】
- https://github.com/ch3rn0byl/ANTfs【删除文件】
- https://github.com/KANKOSHEV/NoScreen [隐藏窗口]
- https://github.com/nlepleux/MappedCallback [隐藏回调]
- https://github.com/rogerxiii/kernel-codecave-poc [查找 Codecave]
- https://github.com/armvirus/SinMapper [签名驱动中的手动映射]
- https://github.com/0xf1a/DSMM【废弃驱动部分手册图】
- https://github.com/ekknod/sumap【EFI手册图】
- https://github.com/VollRagm/lpmapper [手动映射到大页面驱动]
- https://github.com/armvirus/CosMapper【签名驱动图】
- https://github.com/gmh5225/HideDriverTesting [隐藏驱动]
- https://github.com/BadPlayer555/TraceCleaner [驱动跟踪清理器]
- https://github.com/Sentient111/ClearDriverTraces [驱动程序跟踪清理器]
- https://github.com/KelvinMsft/NoTruth【通过VT隐藏内存】
- https://github.com/EBalloon/MapPage【自带地图驱动】
- https://github.com/Compiled-Code/eac-mapper【自映射驱动】
- https://github.com/nbqofficial/HideDriver【通过修改Flink/Blink隐藏驱动】
- https://github.com/ExpLife0011/HideDriver [通过 MiProcessLoaderEntryk 隐藏驱动程序]
- https://github.com/gmh5225/Driver-HideKernelThread-IoCancelIrp [隐藏内核线程]
- https://github.com/kitty8904/blanket [隐藏内核线程]
- https://github.com/jxy-s/herpaderping [隐藏进程/文件]
- https://github.com/Cracked5pider/KaynStrike【恶搞帖起始地址】
- 使用 .reloc 部分替换典型的分配调用
- https://github.com/longpoxin/hideroot [Magisk]
- https://github.com/Rwkeith/Diglett [隐藏内核线程]
- https://github.com/gmh5225/Driver-SessionMapper [会话驱动]
- https://github.com/gmh5225/Driver-DriverNoImage [劫持驱动程序]
反取证
触发机器人和瞄准机器人
- https://github.com/changeofpace/MouHidInputHook
- https://github.com/ekknod/MouseClassServiceCallbackTrick
- https://github.com/blackhades00/PareidoliaTriggerbot
- https://github.com/adspro15/DirectInput
- https://github.com/nbqofficial/norsefire
- https://github.com/petercunha/Pine [神经网络]
- https://github.com/lucylow/b00m-h3adsh0t [神经网络]
- https://github.com/univrsal/input-overlay [键盘映射器]
- https://github.com/Miffyli/gan-aimbots [机器学习]
- https://github.com/lehmenkuehler/camera-triggerbot [相机触发机器人]
- https://github.com/BuddyBoi/KernelMoveMouse [gptCursorAsync]
- https://github.com/Zpes/mouse-input-injection [NtUserInjectMouseInput]
- https://github.com/OSNSON/Overwatch-1-cheat-source-。[NtUserInjectMouseInput]
- https://github.com/gmh5225/NtUserInjectMouseInput-系统调用 [NtUserInjectMouseInput SYSCALL]
- https://github.com/327135569/ClickPic [OpenCV + Triggerbot]
- https://github.com/gmh5225/OpenCV-SmartAimBot [OpenCV + Triggerbot]
- https://github.com/Lexikos/AutoHotkey_L
墙黑客
硬件标识符
- https://github.com/dword64/Ow-反旗
- https://github.com/btbd/hwid
- https://github.com/gmh5225/Driver-HWID-btbd-modified
- https://github.com/xEnething/Permanent-HWID-Spoofer
- https://github.com/Theordernarkoz/Hwid-Spoofer-EAC-BE
- https://github.com/semihcevik/hwidspoofer
- https://github.com/Theordernarkoz/Hwid--Spoofer
- https://github.com/Theordernarkoz/Hwid-Spoofer
- https://github.com/SarnaxLii/Apex-ClearTrace
- https://github.com/InstinctTheDevil/EclipsedSpoofer-EAC-BE
- https://github.com/BuzzerFelix/HWIDSpooferEAC
- https://github.com/SamuelTulach/rainbow [EFI]
- https://github.com/firebitsbr/-彩虹---EFI [EFI]
- https://github.com/btbd/wpp [通过WPP拦截DeviceControl]
- https://github.com/vmcall/owned_alignment [滥用对齐]
- https://github.com/gmh5225/Hwid-Spoofer-Valorant-Eac-Be-Vanguard-Permanted-Temporary-Spoofer
- https://github.com/mopped7/Hwid-Spoofer-Game-Anticheat-Cleaners-Unban-Any-Games-Drivers
- https://github.com/StHomeLess/HWID-Kernel-Spoofer
- HWID-Spoofer-UD-Fortnite-WarZone-Apex-Rust-Escape-From-Tarkov-and-all-EAC-BE-Games-IMGUI-Loader-Base
- https://github.com/SamuelTulach/mutante
- https://github.com/Veuqx0/ImGui-Spoofer-Leaked
- https://github.com/gupr0x4/HWID-Spoofer-for-Fortnite-and-Valorant
- https://github.com/archie2adolphe/Full-Hwid-Spoofer-V6
- https://github.com/Lyut/SteamSpywareTerminator [蒸汽]
- https://github.com/SamuelTulach/negativespoofer [EFI]
- https://github.com/Alex3434/wmi-static-spoofer
- https://github.com/ReFo0/hwid-spoofer
- https://github.com/namazso/hdd_serial_spoofer
- https://github.com/gmh5225/EASY-HWID-SPOOFER
- https://github.com/gmh5225/HWID-Pasted-Hwid-Spoofer
绕过页面保护
SDK代码生成器
- https://github.com/cursey/sdkgenny
- https://github.com/praydog/luagenny
- https://github.com/ssyuqixe/obfCoder
游戏引擎资源管理器:虚幻
- https://github.com/asjbdkabs/shootergame-Hack [ShooterGame 演示]
- https://github.com/CorrM/CleanCheat【游戏金手指库】
- https://github.com/Shhoya/Shh0yaUEDumper [SDK 转储]
- https://github.com/guttir14/UnrealDumper-4.25 [SDK 转储]
- https://github.com/EZFNDEV/UEDumper [SDK 转储]
- https://github.com/MJx0/AndUE4Dumper [Android 的 SDK 转储]
- https://github.com/kp7742/UE4Dumper [适用于 Android 的 SDK 转储]
- https://github.com/Real-Ascarre/UE4-Apk-Dumper [Android SDK 转储]
- https://github.com/Zakaria-Master/UE4Dumper_Emulator [Android 的 SDK 转储]
- https://github.com/MJx0/iOS_UE4Dumper [IOS 的 SDK 转储]
- https://github.com/CorrM/Unreal-Finder-Tool [SDK 视图]
- https://github.com/spudgy/UnrealEngine4-SwissKnife [SDK 视图]
- https://github.com/shalzuth/UnrealSharp [SDK 视图]
- https://fearlessrevolution.com/viewtopic.php?f=23&t=14414 [UE4 CE 表]
- https://github.com/cursey/ue4genny [SDK 生成器]
- https://github.com/Zebratic/UE4Injector [注入]
- https://github.com/N-T33/UE4-Silent-Aim [Aimbot]
- https://github.com/YMY1666527646/ue4_base【SDK模板】
- https://github.com/percpopper/UE4-Freecam [视场变换器]
- https://github.com/RussellJerome/UnrealModLoader [模组加载器]
- 拦截对任何游戏对象的 ProcessEvent 调用(虚幻引擎 4)
- UE4秘籍源码
- https://github.com/bbgsm/ue4_cheat_engine [UE4 安卓作弊]
- 解压、打包、列出、检查和装载 Unreal Engine 4 .pak 档案
- https://github.com/Qemu-Gang/QemuUnrealDumper-4.25 [QEMU 的 SDK 转储]
- https://github.com/kenn-notation/UnrealEngineSDK【通用金手指开发包】
- https://github.com/atenfyr/UAssetGUI [查看和修改UE4游戏资产]
- https://github.com/UE4SS-RE/RE-UE4SS [虚幻引擎4/5脚本系统的重新托管]
游戏引擎资源管理器:Unity
- https://github.com/mono/mono [单声道]
- https://github.com/dnSpy/dnSpy-Unity-mono [单声道]
- https://github.com/dnSpy/Mono.Debugger.Soft [单声道调试器]
- https://github.com/Perfare/Il2CppDumper [Il2Cpp 转储]
- https://github.com/khang06/Il2CppDumper-YuanShen [用于 Genshin Impact 的 Il2Cpp 转储]
- https://github.com/Perfare/Il2CppDumper [Il2Cpp 转储 GUI]
- https://github.com/Poko-Apps/Il2cppDumpDroidGUI [Il2Cpp 转储 GUI]
- https://github.com/shalzuth/Il2CppRuntimeDumper [Il2Cpp 转储运行时]
- https://github.com/Perfare/Zygisk-Il2CppDumper [适用于 Android 平台的 Il2Cpp 转储]
- https://github.com/kp7742/IL2CPPDumper [适用于 Android 平台的 Il2Cpp 转储]
- https://github.com/yukiarrr/Il2cppSpy [Unity IL2CPP Disassembler (for apk)]
- https://github.com/djkaty/Il2CppInspector [Il2Cpp 转储]
- https://github.com/sinai-dev/UnityExplorer
- https://github.com/4ch12dy/il2cpp [Il2Cpp版本]
- https://github.com/nneonneo/Il2CppVersions [Il2Cpp 版本]
- https://github.com/sneakyevilSK/IL2CPP_Resolver
- https://github.com/knah/Il2CppAssemblyUnhollower
- https://github.com/reahly/mono-external-lib [外部单声道示例]
- https://github.com/Compiled-Code/external-il2cpp [Il2Cpp]
- https://github.com/Octowolve/Il2CppSDKGenerator [适用于 Android 的 Il2Cpp SDK 生成器]
- https://github.com/00christian00/UnityDecompiled [反编译的 Unity dll 文件的非官方回购]
- https://github.com/knah/Il2CppAssemblyUnho llower [托管->IL2CPP 代理程序集]
- https://github.com/CodeCracker-Tools/MegaDumper [转储本机和 .NET 程序集]
- https://github.com/SeriousCache/UABE [提取资产]
- https://devxdevelopment.com/Unpacker [提取资产]
- https://github.com/AssetRipper/AssetRipper【提取资产】
- https://github.com/Perfare/AssetStudio【提取资产】
- https://github.com/axhlzy/Il2CppHookScripts [Il2Cpp 钩子脚本]
- https://github.com/gmh5225/Il2Cpp-HookScripts [Il2Cpp/Mono Hook 脚本]
- https://github.com/BataBo/ACEPatcher [.NET 补丁程序]
- 一个将apk文件翻译成普通android项目的工具,支持so hook include il2cpp c++ scaffolding
- https://github.com/xxzzddxzd/unitySpeedTools【IOS极速工具】
- https://github.com/interception-team/il2cpp-finder [Il2Cpp Finder]
- https://github.com/gmh5225/frida-il2cpp-datacollector [适用于 Android/IOS 的 Il2Cpp 数据收集器]
- https://github.com/BepInEx/BepInEx [插件/模组框架]
游戏引擎资源管理器:来源
- https://github.com/anarh1st47/Source2Dumps [转储]
- https://github.com/CallumCVM/ValveGen [SDK 生成器]
- https://github.com/praydog/Source2Gen [SDK 生成器]
- https://github.com/keowu/sourceengineexplorer [资源管理器]
探索 UWP
探索反作弊系统:VAC
- https://github.com/danielkrupinski/VAC-Bypass-Loader
- https://github.com/danielkrupinski/vac-hooks
- https://github.com/mdilai/Shtreeba [注入器]
- https://github.com/zyhp/vac3_inhibitor
- https://github.com/krispybyte/Vook [VAC 挂钩]
- https://github.com/ioncodes/vacation3-emu [VAC3 模块模拟器]
- https://github.com/altoid29/VACDumper [转储]
- https://github.com/Jackbail4/VAC-绕过
探索反作弊系统:EAC
- https://github.com/thesecretclub/CVEAC-2020 [完整性检查]
- https://github.com/Schnocker/EAC_dbp [调试]
- https://github.com/Compiled-Code/eac-mapper [Eac映射器]
- https://github.com/EBalloon/MmCopyMemory [绕过MmCopyMemory]
- https://github.com/gmh5225/EAC-Kernel-Packet-Fucker [Packet Fucker]
- https://github.com/TupleDev/HydraHook [数据包混蛋]
- https://github.com/woomy144/EazyAntiCheatSRC [反向来源]
- https://github.com/chaeyk/eac-leak [EAC sdk的内存泄漏]
- https://github.com/ksoju/Eac-绕过
- https://github.com/EBalloon/EasyAntiCheat-SRC
- https://www.unknowncheats.me/forum/anti-cheat-bypass/458928-eacs-maskable-interrupt-callback.html [NMI]
- https://www.unknowncheats.me/forum/anti-cheat-bypass/464943-eac-nmi-bypass-callbacks.html [NMI绕过]
- https://github.com/CheeZeDark/EasyAntiCheat-Reversing
- https://github.com/Sinclairq/hiearchy-eac [完整性检查]
- https://github.com/Rat431/EAC_Emu [简单的 EasyAntiCheat x64 模拟器]
- https://github.com/xBrunoMedeiros/eac-overlay [EAC 覆盖]
- https://github.com/Imabot115/ce-EasyAntiCheat-Bypass [UD CE]
- https://github.com/ioncodes/pooldump【解压EACs手动映射到游戏进程的DLL】
- https://github.com/gmh5225/EAC-VmCheck.asm【虚拟机检查】
- https://www.unknowncheats.me/forum/anti-cheat-bypass/561479-eacs-instrumentation-callback-bypass.html
- https://github.com/gmh5225/Eac-Injector-Driver [喷油器]
探索反作弊系统:BE
- https://github.com/Schnocker/NoEye
- https://github.com/unreaIuser/BE-Emulator
- https://github.com/masterpastaa/BattlEye-Handler-BYPASS
- https://github.com/dllcrt0/battleye-解密
- https://github.com/dllcrt0/bedaisy-reversal
- https://github.com/dllcrt0/battleye-shellcode
- https://github.com/Compiled-Code/be-injector [攻击牛]
- https://github.com/Aki2k/BEDaisy
- https://github.com/落花鱼/BadEye
- https://github.com/zouxianyu/BlindEye [数据包混蛋]
- https://github.com/huoji120/goodeye
- https://github.com/LilPidgey/BEClient
- https://github.com/lguilhermee/Battleye-Shellcode-Dumper [BEClient2.dll 转储程序]
- https://github.com/es3n1n/be-shellcode-tester [BattlEye shellcodes 测试器]
- https://github.com/steffalon/battleye-rust [BattlEye RCON UDP 连接]
- https://github.com/Hypercall/FakeEye [模拟器]
- https://github.com/tr1xxx/battleye-region-walking
探索反作弊系统:EQU8
- https://back.engineering/12/08/2021
- https://github.com/kkent030315/EQU8-PoC
- https://github.com/hotline1337/equ8_bypass
探索反作弊系统:Ricochet
探索反作弊系统:RIOT
- https://github.com/Nuxar1/DecryptionDumper [转储]
- https://github.com/lil-skies/val-exception-handler [ZwRaiseException 转储]
- https://github.com/gmh5225/Dump-val-exception-handler [RtlpCallVectoredHandlers 转储]
- https://github.com/AdvancedVectorExtensions/VanguardImportResolver [解决vgk的受保护导入]
探索反作弊系统:XignCode
- https://github.com/Skengdo/XignCode-Dump
- https://github.com/st4ckh0und/XignCode3-bypass-alternative
- https://github.com/st4ckh0und/XignCode3-旁路
探索反作弊系统:ACE
探索反作弊系统:G-Presto
探索反作弊系统:NeacSafe
探索反作弊系统:BadlionAnticheat
探索反作弊系统:Byfron
- https://byfron.tech/
- https://www.unknowncheats.me/forum/anti-cheat-bypass/505486-byfron-tech-anti-cheat-released.html
- https://gist.github.com/gmh5225/cbe40345a9400b01329e025478ffb826 [哈希]
探索反作弊系统:NGS
- https://github.com/st4ckh0und/NexonGameSecurity-bypass
- https://github.com/st4ckh0und/NexonGameSecurity-bypass-alternative
- https://github.com/st4ckh0und/NexonGameSecurity-bypass-wow64
探索反作弊系统:FACEIT
游戏:冒险岛
- https://forum.ragezone.com/f922/getting-packet-structures-opcodes-using-792436 [数据包]
- https://github.com/Bratah123/SpiritIDAPlugin [IDA-插件]
- https://github.com/icelemon1314/mapleLemon [私服-CMS-027]
- https://github.com/ellermister/MapleStory [私服-CMS-079]
- https://forum.ragezone.com/f428/maplestory-private-server-v83-741739 [私人服务器-GMS-083]
- https://github.com/Z41N/v83MaplestoryCPP [私服-GMS-083 C++]
- https://github.com/Fraysa/Destiny [私服-GMS-083 C#]
- https://github.com/Bratah123/ElectronMS [私服-KMS-316]
- https://github.com/reanox/MapleStory-v113-Server-Eimulator [私人服务器-TMS-113]
- https://github.com/Bratah123/BattleAnalysis176【战斗分析】
- https://github.com/johnsonjason/MapleStoryBuildFramework [反作弊]
- https://github.com/Noosh404/Maplestory-V179-Cheat-Engine [V179 CT]
- https://github.com/HeavenClient/HeavenClient【天堂客户端】
- https://github.com/Inndy/TWMS-Hacking-Data [TMS CT]
- https://github.com/Inndy/MSDoggy [TMS 老黑客]
- https://github.com/PrinceFroggy/MSB [GMS 老黑客 128-140]
- https://github.com/PrinceFroggy/MSC [GMS 机器人]
- https://github.com/v3921358/Rebirth [私服-GMS-095 C#]
- https://github.com/MapleStoryGameHack/mnwvs196 [私服-TMS-196]
- https://github.com/Maxcloud/MapleResearch【GMS-095客户端分析】
- https://github.com/neeerp/RustMS【私服-Rust】
- https://github.com/Kagamia/WzComparerR2 [冒险岛在线提取器]
- 从 Maplestory 生成不同格式的机器学习对象检测样本
游戏:我的世界
游戏:酱剑
游戏:枪火重生
游戏:秋天的家伙
- https://github.com/shalzuth/FallGuysSharp
- https://github.com/ioncodes/FallGuys
- https://github.com/aci1337/Flying-Guys-fully-modified
- https://github.com/FarmEquipment69/FlyingGuys
游戏:Remnant
游戏:迷失方舟
- https://github.com/shalzuth/LostArkDumper
- https://github.com/shalzuth/LostArkLogger
- https://github.com/realrespecter/LOST-ARK-SDK
游戏:Battlerite
游戏:穿越火线
游戏:TGame
游戏:LOL
- https://github.com/LeagueSharp
- https://github.com/SwipeDan/LeagueSharp
- https://github.com/ensoulsharp-io
- https://ferrisbot.com/ferrisaio
- https://github.com/SwipeDan/EloBuddy-Addons
- https://github.com/shalzuth/LeagueSharp
- https://github.com/shalzuth/LoLClient
- https://github.com/RyukOP/L-Assemblies
- https://github.com/korllan/LeagueSharp.Loader
- https://github.com/R3nzTheCodeGOD/R3nzSkin [皮肤]
- https://github.com/R3nzTheCodeGOD/R3nzSkinTFT [皮肤]
- https://github.com/B3akers/LeagueSkinChanger [皮肤]
- https://github.com/real-web-world/hh-lol-prophet
- https://github.com/Nuxar1/DecryptionDumper [转储]
- https://github.com/tarekwiz/LeagueDumper [转储]
- https://github.com/tarekwiz/League-Unpacker [转储]
- https://github.com/LeaguePrank/LeagueTeamBoost
- https://github.com/newworld7777/League-of-Legends-Bot-Orbwalker-Lasthit-Laneclear-Skin-Changer-Vanguard-Spoofer
- https://github.com/LeagueSandbox
- https://github.com/MythicManiac/lol-unpackman
- 全新英雄联盟助手软件,WeGame的替代品
- https://github.com/orkido/LViewLoL [基于 Python 的脚本平台]
- https://github.com/KebsCS/KBotExt [LCU]
- https://github.com/botkalista/ayaya-league-external [基于 Nodejs 的脚本平台]
- https://github.com/jfd02/TFT-OCR-BOT [TFT]
- https://github.com/sooqua/VanderLeague [管理程序辅助]
- https://github.com/KebsCS/League-DirectX11-Internal [内部]
游戏:NARAKA
- https://www.unknowncheats.me/forum/other-fps-games/490052-naraka-bladepoint-reversal-structs-offsets.html
- https://github.com/xkp95175333/DummyDlls_NARAKA_1_9_21 [转储]
- https://github.com/Rythorndoran/Naraka-Hack
游戏:Thetan
游戏:Dota2
- https://github.com/skrixx68/Dota2-Overlay-2.0
- https://github.com/skrixx68/Dota2-Overlay-OffsetUpdater
- https://github.com/interception-team/dota-cheat
- https://github.com/LWSS/McDota [Linux]
游戏:魔兽世界
- https://github.com/helloobaby/wow-IAT-fix
- https://github.com/namreeb/dumpwow
- https://github.com/xakepru/x14.08-coverstory-blizzard
- https://github.com/fail46/OHack [魔兽世界的开源 hack]
- https://github.com/adde88/SkyEngine [Wow Lua 解锁器]
- https://github.com/gmh5225/WOW-WowAutoFishing [自动钓鱼]
游戏:魔兽争霸III
游戏:半条命2
游戏:CS1.6
游戏:CSGO
- https://github.com/csgohacks/master-guide [指南]
- https://github.com/Akandesh/blazedumper [抵消]
- https://github.com/frk1/hazedumper [偏移量]
- https://github.com/KittenPopo/csgo-offsets [偏移量]
- https://github.com/ofDataa/offsets [偏移量]
- https://github.com/Akandesh/csgo_auto_dumper [自动转储]
- https://github.com/dretax/GarHal_CSGO
- https://github.com/danielkrupinski/Osiris
- https://github.com/danielkrupinski/GOESP [跨平台]
- https://github.com/danielkrupinski/Anubis
- https://github.com/s3pt3mb3r/Dainsleif
- https://github.com/lagcomp/csgo_sdk
- https://github.com/ekknod/csf_w [Win SDK]
- https://github.com/ekknod/csf [Linux SDK]
- https://github.com/Speedi13/ROP-COMPILER
- https://github.com/AimTuxOfficial/AimTux [Linux]
- https://github.com/seksea/gamesneeze [Linux]
- https://github.com/EternityX/DEADCELL-CSGO
- https://github.com/nbqofficial/kernel-csgo
- https://github.com/HeathHowren/CSGO-秘籍
- https://github.com/Kruziikrel1/CSGO-FindMDL [模型转换器]
- https://github.com/ekknod/nv_v2 [声音 ESP]
- https://github.com/DerGrosse-prog/Improved-CSGO_Simple
- https://github.com/0TheSpy/SpyExternal1337hax [外部]
- https://github.com/0TheSpy/Seaside [内部]
- https://github.com/whereisr0da/Lumina-Cheat [内部]
- https://github.com/nbqofficial/norsefire [驱动+鼠标仿真]
- https://github.com/boltgolt/boltobserv [雷达]
- https://github.com/worse-666/csgo_external_ahk_hack [外部]
- https://github.com/ch4ncellor/CSGO-P2C-Dumper [转储]
- https://github.com/Akatsyk/2k17-club
- https://github.com/flowxrc/csgo-xenforo-loader
- https://github.com/ALittlePatate/ezfrags
- https://github.com/Neaxic/CSGO-MAIN-INTERNAL
- https://github.com/W1lliam1337/digital-sdk
- https://github.com/sneakyevilSK/CSGO_BacktrackPatch [回溯补丁]
- https://github.com/NullTerminatorr/NullBase [外部]
- https://github.com/krxdev-kaan/AqHax-CSGO
- https://github.com/slack69/csgo-dma-overlay [DMA]
- https://github.com/rrpvm/csgo-external-cheat
- https://github.com/petercunha/Pine [神经网络]
- https://github.com/Bartis1313/csgo
- https://github.com/NullHooks/NullHooks [内部]
- https://github.com/Skarbo/CSGOCrosshair [十字准线生成器]
- https://github.com/ekknod/G37OBS [csgo 的 obs-studio 插件]
- https://github.com/Sentient111/Csgo-Full-kernel [从内核模式运行]
- https://github.com/razixNew/CompiledProtection [作弊编译器]
- https://github.com/ekknod/EC
- https://github.com/soyware/heck_csgo_external [外部]
- https://github.com/martinjanas/Sensum [内部]
- https://github.com/cazzwastaken/kakhack [内部]
- https://github.com/binkynz/cstrike-hack
- https://github.com/R4YVEN/raybot-zero [内核模式]
- https://github.com/gmh5225/CSGO-Loader [加载程序]
- https://github.com/gmh5225/CSGO-NIXWARE-CSGO [Nixware]
- https://github.com/designer1337/csgo-cheat-base [内部]
游戏:英勇
- https://github.com/apekros/valorant_offsets [抵消]
- https://github.com/10HEAD/ValorantOffsets [偏移量]
- https://github.com/ofDataa/offsets [偏移量]
- https://github.com/pebu1337/valorant-externals [抵消]
- https://github.com/Pinguu-dev/PINGUU-VAL
- https://github.com/skechtew/valorant-gui-imgui-remake [图形用户界面]
- https://github.com/reahly/valorant-internal
- https://github.com/Chase1803/ValorantKeyAndState【解密】
- https://github.com/gmh5225/Zenti-Valorant-Cheat-Hack-Internal-Spoofer-Driver-Injector-Protector-Auth
- https://github.com/gmh5225/Valorant-Hack-Esp-Aimbot-Driver-Injector-With-Spoofer-Temporary
- https://github.com/xehn1337/valorant-dumper [转储]
- https://github.com/Chase1803/Valorant-Dumper-Tool [转储]
- https://github.com/lil-skies/val-exception-handler [ZwRaiseException 转储]
- https://github.com/kerememrerer/Eduty-Valorant-Esp-Aimbot-Hack
- https://github.com/frankelitoc/UE4-c- [外部]
- https://github.com/AryuInka/Valorant-Cheat-External [外部]
- https://github.com/xEnething/Valorant-Cheat
- 迭代并解密 FNamePool->Valorant 上的条目
- https://github.com/gmh5225/Valorant-External-1
- https://github.com/Chase1803/UCMiraka-ValorantExternal [NtUserGetPointerProprietaryId]
- https://github.com/Chase1803/ValorantCheatExternal
- https://github.com/weedeej/ValorantCC [十字线设置]
- https://github.com/gmh5225/Internal-Valorant-Cheat
- https://github.com/gmh5225/VALORANT-HACK-ESP-AIMBOT-SKINCHANGER
- https://github.com/MauhTon/valorant-esp-hack-with-driver
- https://github.com/MauhTon/Valorant-Aimbot-Bypass
- https://github.com/zeroday-z/CyberAntLoader
- https://github.com/Fnoberz/Valorant.External
- https://github.com/R7flex/valorant-internal-base [内部]
- https://github.com/gmh5225/VALORANT-HACK-ESP-AIMBOT-SKINCHANGER-SOURCE [内部]
- https://github.com/gmh5225/Valorant-External-Source [外部]
游戏:面纱专家
- https://github.com/EBalloon/VEILED-EXPERTS-SDK
- https://github.com/LagradOst/ProjectD-Win64-Shipping
- https://github.com/Da3kL3o/VeiledExpertsSDK
游戏:COD1
游戏:COD7
游戏:COD 黑色行动3
- https://github.com/momo5502/boiii【逆向工程与分析】
游戏:COD战区
- https://github.com/YMY1666527646/Call-of-Duty-Warzone-MW-HACK-ESP-AIMBOT
- https://github.com/serjam/mwclap
- https://github.com/NMan1/external-warzone-cheat
- https://github.com/NMan1/warzone-internal
- https://github.com/KoobiR76/Call-Of-Duty-Warzone-Hack-Esp-Slient-Aimbot-Internal-Unlock-ALL
- https://github.com/KoobiR76/Call-Of-Duty-Vanguard-Hack-Esp-AImbot-Unlock-All
- https://github.com/gmh5225/Warzone-internal-Cheat
- https://github.com/SpiroHappy/Warzone-MW-Internal
- https://github.com/gmh5225/-Modern-Warfare-Warzone-Cheat
游戏:CODM
- https://github.com/Poko-Apps/CodMDumper [il2cpp 转储]
- https://github.com/gmh5225/CODM-ESP-Aimbot-Mod-Menu [ESP]
游戏:战地1
- https://github.com/Zakaria-Master/BF1-ESP-AND-AIMBOT
- https://github.com/younasiqw/BattleField-1-Internal
游戏:战地4
游戏:战地2042
游戏:Apex 英雄
- https://github.com/dhanax26/Apex-Legends-Offset-Dumper [偏移量]
- https://github.com/ofDataa/offsets [偏移量]
- https://github.com/dword64/Apex-Legends-SDK-Remaster
- https://github.com/hooksteroid/ApexD3D_External
- https://github.com/NMan1/apex-legends-cheat
- https://github.com/rakuza2/SIMPLE-AIMBOT-GLOW-APEX
- https://github.com/TheCruZ/Direct-EFI-Apex-Cheat
- https://github.com/Astronaut00/apex-external
- https://github.com/YMY1666527646/Phoenix-Valorant-Cheat
- https://github.com/CasualX/apexbot
- https://github.com/loplopuu23/APEX_ESP_AIMBOT
- https://github.com/TheCruZ/Apex_Legends_Driver_Cheat
- https://github.com/Keyzp1337/堡垒之夜
- https://github.com/Zurek0x/NuremX [人工智能]
- https://github.com/hadevn/apex_full_cheat
- https://github.com/gmh5225/Apex-ApexCheeseTest
- https://github.com/RavenOfTime/Apex-Legends-Esp
- https://github.com/DeplayBack/ApexCheat
- https://github.com/Zakaria-Master/Apex_ESP_Old_Project
- https://github.com/cheatingwitdacode/apex-cheating
- https://github.com/LWSS/Ape-ex-Abominations [QEMU]
- https://github.com/gmh5225/Apex-CHEAT-FIXED
- https://github.com/cyberpw/apex_legends_sdk
- https://github.com/ekknod/apex_linux [Linux]
- https://github.com/XRadius/project-tanya [linux]
- https://github.com/KaylinOwO/Project-Branthium
- https://github.com/gmh5225/Apex-Legends-External-Esp-Aimbot-Skinchanger
- https://github.com/Neurosisccc/Apex-ItemGlow [物品发光]
游戏:堡垒之夜
- https://github.com/ofDataa/offsets [偏移量]
- https://github.com/masterpastaa/AutoOffsets [偏移量]
- https://github.com/Zetolac/FortniteOffsetsAndSigs [抵消]
- https://github.com/Android1337/Fortnite-Offsets [偏移量]
- https://github.com/TayzDev/W2S-offset-Fortnite [偏移量]
- https://github.com/Luksiuss/FortniteSigsUpdatedEveryUpdate [抵消]
- https://github.com/Android1337/FortniteSigsUpdatedEveryUpdate [偏移量]
- https://github.com/plu1337/fortnite-offsets [偏移量]
- https://github.com/panzehirr/Fortnite-Offset-dumper [偏移和转储]
- https://github.com/plu1337/fortnite-virtual-offsets [虚拟表偏移量]
- https://github.com/plu1337/fortnite-sigs [签名]
- https://github.com/plu1337/fortnite-exploits [漏洞]
- https://github.com/RealReaper/Fortnite-Offsets-Sigs-and-more [抵消]
- https://github.com/Makk5/FortConsole
- https://github.com/skidseal/FortniteLeak5
- https://github.com/Zetolac/FortniteExternalW2S
- https://github.com/Kiaoee/Fortnite-Internal-Cheat-Fixed-and-Updated
- https://github.com/Kiaoee/Fortnite-EFI-外部[EFI]
- https://github.com/Giteob/Fortnite-External-Cheat-WinSense-Leak
- https://github.com/jooola00/fortnite-cheat-source-internal
- https://github.com/YMY1666527646/Fortnite-Hack-Esp-Exploits-With-Menu
- https://github.com/YMY1666527646/nigusFN
- https://github.com/Sheeedsh78/Cheto-Fortnite-Source-External-EAC-BE-undetected
- https://github.com/CheaterRehab/GodFather-Fortnite-Cheat-Cracked
- https://github.com/newworld7777/FortGay
- https://github.com/Keyzp1337/堡垒之夜
- https://github.com/vk-nom/Basic-Fortnite-Cheat-Source-Internal
- https://github.com/PasterWolf/Fortnite-UD-External
- https://github.com/Chase1803/Gloomy.cc-堡垒之夜
- https://github.com/sanntomirai/Fortnite-Esp-Aimbot-Exploits-Hwid-Spoofer-Cleaner-Hack-Cheat
- https://github.com/Waihbe/Fortnite-Cheat-LEAK
- https://github.com/zinx-YT/Fortnite-Fltokens-and-offsets
- https://github.com/Giteob/VOLTO-EXTERNAL-SPOWAR-UD-EAC-BE-FORTNITE-EXTERNAL-CHEAT
- https://github.com/gmh5225/Serenity.gg-FN-and-Loader
- https://github.com/Waihbe/Fortnite-External-Cheat-Leak
- https://github.com/AlfredIU/Spoofer [HWID]
- https://github.com/pastor-ritz/ritz-amazing-fortnite-internal
- https://github.com/SarnaxLii/Fortnite-External
- https://github.com/plu1337/Fortnite-Masterpasta-ihack-Source-Leak
- https://github.com/Giteob/Fortnite-Evo.cc-Source-External-Cheat
- https://github.com/KeyzpOnTheFluxxx/Fortnite-External
- https://github.com/gmh5225/Apple-Lite-Fortnite-Cheat
- https://github.com/Luksiuss/Fortnite-External-Cheat-Source-Code
- https://github.com/0dayatday0/BattleFN-作弊分析
- https://github.com/aqaylore/fortnite-internal-updated-ritz [内部]
- https://github.com/JeanToBinks/Fortnite-Cheato-UD-EAC-BE
- https://github.com/gmh5225/BE-Forcer-Fortnite [成为堡垒之夜的力量]
游戏:猎血
游戏:超人
- https://github.com/EBalloon/Super-People-sdk
- https://github.com/jeradwtf/Super-People-Esp-Aimbot-Magic-Hack
游戏:分裂门
游戏:绝地求生
- https://github.com/owdata1/pubg-dumper [转储]
- https://github.com/Skengdoo/pubg-external-cheat
- https://github.com/ajkhoury/pubg_internal
- https://github.com/iCollin/pubg-internal
- https://github.com/K-cazb/pubg-public
- https://github.com/gmh5225/PlayerUnknown-s-Battlegrounds-Pubg-Steam-Hack-Esp-Aimbot
- https://github.com/dot1991/lilypublic
- https://github.com/kurt2467/PUBG_Internal
游戏:PUBG Lite
游戏:PUBGM
- https://github.com/Zakaria-Master/pubgm_sdk_and_offsets [抵消]
- https://github.com/atulkunal999/pubg_mobile_memory_hacking
- https://github.com/Mood-Coding/pubgm_shitty_source
- https://github.com/TheLoneHaxor/Pubg-Mobile-Extermal-Esp-Aimbot-Magic-Injector-Spoofer
- https://github.com/sanntomirai/Pubg-Mobile-Esp-Aimbot-Magic-Injector-Spoofer
- https://github.com/kp7742/PUBGPatcher
- https://github.com/Zakaria-Master/PUBGM1.6-DeadGame
- https://github.com/mut1234/BYPASS-PUBG-MOBILE-IMGUI
- https://github.com/busmanl30/LastIslandOfSurvival-iOSCheat-Source
游戏:电子转帐
- https://github.com/patrickcjk/TOG [偏移生成器]
- https://github.com/fcancelog/EftStreamedCheat
- https://github.com/sanntomirai/Escape-From-Tarkov-External-Esp-Aimbot-eft-Hack-Cheat-Injector-Spoofer
- https://github.com/Nou4r/pKernelInterface-EFT
- https://github.com/sailro/EscapeFromTarkov-Trainer
- https://github.com/vmwrite/tiny_eft
- https://github.com/CplNathan/Nathans-Tarkov-Radar-Public [Vmread + 雷达]
- https://github.com/frankie-11/eft-external
- https://github.com/Splitx12/eft
- https://github.com/TupleDev/eft-internal
- https://github.com/TupleDev/Veil-EFT
- https://github.com/Qemu-Gang/Escape-from-TuxKov [QEMU]
- https://github.com/gmh5225/Comm-ImMiraclela
- https://github.com/krispybyte/Simple-EFT-Base
- https://github.com/bytemyass/EFTLeecher [DMA]
- https://github.com/gmh5225/eft-dma-radar-1 [DMA 雷达]
- https://github.com/dwabdasdna/MonoEFT
- https://github.com/ZhaoKunqi/simple-eft-superman-training-bot
游戏:R6
- https://github.com/NMan1/Rainbow-Six-Cheat
- https://github.com/NMan1/OverflowR6V2
- https://github.com/NMan1/Internal-Rainbow-Six-Cheat-V3
- https://github.com/beans42/epic-r6-v9
- https://github.com/Kix48/R6Updater
- https://github.com/hooksteroid/R6Table_Internal
- https://github.com/JGonz1337/r6-internal
- https://github.com/SurgeGotTappedAgain/External-R6S-Cheat
- https://github.com/vctr74/R6-Internal-V3
- https://github.com/UnamDeve/R6S-internal-Cheat
- https://github.com/gmh5225/Rainbow-Six-Siege-Rs6-External-Esp-Aimbot-Hack-Cheat
- https://github.com/gmh5225/Rainbow-6-Siege-Cheat
游戏:守望先锋
- https://github.com/blackhades00/PareidoliaTriggerbot [触发机器人]
- https://github.com/ReynmenRcs/Overwatch-External-Esp-Aimbot-Hack-Cheat
- https://github.com/OSNSON/Overwatch-1-cheat-source-。
- https://github.com/vmmcall/overwatch-iat-fixer [守望先锋 IAT 修复程序]
- https://github.com/Midi12/ow_unpack
- https://github.com/gmh5225/OW-Aeternum
游戏:守望先锋2
- https://github.com/gmh5225/Overwatch2-colorbot-秘籍
- https://github.com/gmh5225/Overwatch-2-Cheat-Aimbot-Esp
游戏:圣骑士
- https://github.com/gmh5225/Paladins-Internal-Esp-Aimbot-Hack-Cheat-Hack
- https://github.com/gmh5225/Paladins-internal-Cheat
游戏:DayZ
- https://github.com/sanntomirai/DayZ-External-Esp-Aimbot-Spoofer-Hack-Cheat
- https://github.com/zhitkur/DayZzz
- https://github.com/SurgeGotTappedAgain/External-Dayz-Cheat
- https://github.com/ForAnow/DayZ-Cheat
游戏:小队
游戏:生锈
- https://github.com/Akandesh/rust-auto-dumper [自动转储]
- https://github.com/NMan1/OverflowRust
- https://github.com/ReFo0/simple-rust-hack
- https://github.com/Facepunch-bot/rust-internal
- https://github.com/Facepunch-bot/Rust-External
- https://github.com/Facepunch-bot/Rico-Cheat-rust-external
- https://github.com/spyder1g/a-pasted-rust-script
- https://github.com/LordAbbot/Rust-External-Cheat
- https://github.com/ZentifyZ/Kors_lol [内部]
- https://github.com/Allerek/Rust-Internal [内部]
- https://github.com/ZentifyZ/CRC32
- https://github.com/SteepCheat/Rust-Cheat-External
- https://github.com/krispybyte/Simple-Rust-Base
- https://github.com/vmwrite/蓝宝石
- https://github.com/Disline1337/Rust-Cheat-External-main
- https://github.com/gmh5225/Rust-RustInternal [内部]
- https://github.com/gmh5225/rust-external-1 [外部]
- https://github.com/Fnoberz/Rust-External [外部]
- https://github.com/gmh5225/Rust-ExternaL-and-Driver-AlienCheats [外部]
游戏:Arma3
- https://github.com/Skengdo/arma3-external-variable-manager
- https://github.com/R3voA3/3den-Enhanced [模组编辑器]
游戏:AVA
游戏:Mordhau
游戏:神之浩劫 [UE3]
游戏:多边形[UE5]
游戏:Genshin Impact
- https://github.com/khang06/mhynot2
- https://github.com/khang06/genshinjumpfixer2 [解码CFG]
- https://github.com/khang06/misc/tree/master/reversing/genshin [解码CFG]
- https://github.com/DNLINYJ/Anti_miHoYo_Jcc_Obfuscate [X64DBG解码CFG]
- https://github.com/GoChanZ/genshin-cheat
- https://github.com/Grasscutters/Grasscutter [私人服务器]
- https://github.com/Akebi-Group/Akebi-GC [作弊]
- https://github.com/Razmoth/GenshinStudio [资产]
- https://github.com/Dimbreath/GenshinData [游戏数据]
- https://github.com/HolographicHat/YaeAchievement
- https://github.com/phonowell/genshin-impact-script [一个甜蜜的 genshin 影响脚本]
- https://github.com/KnsGoyoLV/GenshinImpact-Base
所属游戏:崩坏
游戏:EldenRing
- https://github.com/techiew/EldenRingMods [模组]
- https://github.com/v-maxson/EldenRingLauncher [启动器]
- https://github.com/Nordgaren/Elden-Ring-Debug-Tool [Elden Ring 模组调试工具]
游戏:黑暗之魂
游戏:盗贼之海
游戏:GTA III - 决定版
游戏:GTA5
- https://github.com/Luksiuss/GTA-5-SIGS-1.59 [抵消]
- 关于 向 GTA V 主窗口添加拖动调整大小功能
- 侠盗猎车手 V (PC) 的开源作弊软件
- https://github.com/Pocakking/BigBaseV2
- https://github.com/YimMenu/YimMenu
游戏:几何冲刺
游戏:8球台球
游戏:精灵101
游戏:QQ堂
游戏:国际象棋
- https://github.com/LeelaChessZero/lc0 [国际象棋引擎]
- https://github.com/official-stockfish/Stockfish [国际象棋引擎]
游戏:BLOCKPOST
游戏:女巫
游戏:RO
游戏:PokemonGo
游戏:L4D2
游戏:mhxy
游戏:Ironsight
游戏:吞噬
反作弊
指导
- https://technology.riotgames.com/news/riots-approach-anti-cheat
- https://github.com/87andrewh/WeirdAntiCheatIdeas
- https://github.com/gmh5225/AntiCheat-chrysalis
- https://www.unknowncheats.me/forum/anti-cheat-bypass/481731-tutorial-ring3-anticheat-project.html
- https://github.com/dhondta/awesome-executable-packing【可执行文件打包】
- https://anti-debug.checkpoint.com [反调试]
- https://github.com/DenuvoSoftwareSolutions/DVRT [DVRT]
- https://areweanticheatyet.com [使用反作弊的游戏列表]
- https://github.com/MyHwu9508/alt-V-Anticheat-Guide [GTA5 多人游戏服务器]
压力测试
- https://github.com/niemand-sec/AntiCheat-Testing-Framework [测试框架]
- https://github.com/gmh5225/MemWars [测试框架]
- https://github.com/stuxnet147/Known-Driver-Mappers [已知驱动程序映射器]
- https://github.com/DanielRTeixeira/injectAllTheThings [注入测试]
- https://github.com/MahmoudZohdy/Process-Injection-Techniques [注入测试]
- https://github.com/zoand/Injectors [注入测试]
- https://github.com/guided-hacking/GuidedHacking-Injector [注入测试]
- https://github.com/aiocat/dll-crab [注入测试]
- https://github.com/odzhan/injection [注入测试]
- https://github.com/w1u0u1/kinject [注入测试]
- https://github.com/D4stiny/ThreadJect [注入测试]
- https://github.com/deepinstinct/Dirty-Vanity [注入测试:RtlCreateProcessReflection]
- https://github.com/NullTerminatorr/ThreadHijackingInjector [注入测试]
- https://github.com/Skengdo/simple-SetWindowsHookExW-injector [注入测试:SetWindowsHookExW]
- https://github.com/gmh5225/SetWindowsHookEx-Injector [注入测试:SetWindowsHookExW]
- https://github.com/FULLSHADE/Jektor [注入/Shellcode 测试]
- https://github.com/KANKOSHEV/face-injector-v2 [注入/测试]
- https://github.com/notscimmy/libelevate [升降手柄]
- https://github.com/ZoondEngine/NoBastian_v2 [LSASS 提升手柄]
- https://github.com/Ricardonacif/launcher-abuser [升降手柄]
- https://github.com/ContionMig/LSASS-Usermode-Bypass [通过 LSASS 提升手柄]
- https://github.com/D1rkMtr/DumpThatLSASS [LSASS 提升手柄]
- https://github.com/gmh5225/Handle-Ripper [重复句柄]
- https://github.com/Kudaes/Dumpy [通过 LSASS 重用打开的句柄]
- https://github.com/Mattiwatti/EfiGuard [PG 测试]
- https://github.com/9176324/Shark【PG测试】
- https://github.com/gmh5225/HideDriverTesting [隐藏驱动测试]
- https://github.com/nbqofficial/HideDriver【隐藏驱动测试】
- https://github.com/ExpLife0011/HideDriver【隐藏驱动测试】
- https://github.com/BadPlayer555/TraceCleaner【隐藏驱动测试】
- https://github.com/muturikaranja/disable-threat-tracing [ETW 测试]
- https://github.com/daswareinfach/Battleye-VAC-EAC-Kernel-Bypass [FsFilter 测试]
- https://github.com/aahmad097/MMFCodeInjection【用户APC+文件映射测试】
- https://github.com/liors619/TtdAntiDebugging [调试测试]
- https://github.com/TupleDev/slemu [心跳测试]
- https://github.com/nkga/cheat-driver [MmCopyVirtualMemory 测试]
- https://github.com/zxd1994/vt-debuger [被黑的管理程序测试]
- https://github.com/3526779568/vt-debuger [被黑的管理程序测试]
- https://github.com/rbmm/LockFile-Poc [锁定文件]
- https://github.com/gmh5225/UltraDriver-Game-Cheat [作弊驱动]
驱动程序单元测试框架
反调试
- https://github.com/LordNoteworthy/al-khaser
- https://github.com/samshine/ScyllaHideDetector2
- https://github.com/revsic/AntiDebugging
- https://github.com/Ahora57/MAJESTY-technologies
- https://github.com/AdvDebug/AntiCrack-DotNet [CSharp]
- https://github.com/weak1337/CEDetector [CE]
- https://github.com/gmh5225/Detection-CheatEngine [CE]
- https://github.com/Ahora57/AmogusPlugin
- https://github.com/polaryy/AntiDebugandMemoryDump [安卓]
- 使用检测 ScyllaHide/HyperHide 和 TitanHide 的示例反调试
- Linux反调试技术
- https://github.com/HackOvert/AntiDBG
- https://github.com/BarakAharoni/LADD [Linux]
- https://github.com/gmh5225/AntiKernelDebug-POC [Windows 内核]
- https://github.com/BaumFX/cpp-anti-debug
- https://github.com/Metick/Anti-Debug
- https://github.com/Ahora57/RaceCondition
- https://github.com/AdvDebug/AntiCrack-DotNet [点网]
- https://github.com/hotline1337/umium [C++/CLI]
- https://github.com/YouNeverKnow00/Anti-Debugger-Protector-Loader
- https://github.com/CheckPointSW/showstopper
- https://github.com/secrary/makin [揭示反调试和反 VM 技巧]
页面保护
- https://github.com/changeofpace/Self-Remapping-Code
- https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-addsecurememorycachecallback
- https://github.com/weak1337/NO_ACCESS_Protection
- https://github.com/hotline1337/page_no_access
- https://github.com/thefLink/DeepSleep
- https://github.com/janoglezcampos/DeathSleep
- https://github.com/mgeeky/ShellcodeFluctuation
- https://github.com/Gofrettin/veh-printf-hook [PAGE_GUARD]
- https://github.com/charliewolfe/PointerGuard [PAGE_GUARD]
- https://github.com/ilovecsad/veh_hide_memory [PAGE_NOACCESS]
二进制打包机
- https://github.com/dhondta/awesome-executable-packing
- https://github.com/phra/PEzor
- https://github.com/czs108/PE-Packer [X86]
- https://github.com/longqun/Packer [X86]
- https://github.com/ATsahikian/pe-protector [X86]
- https://github.com/mkaring/ConfuserEx [.NET]
- https://github.com/iArtorias/debug_remover [剥离调试信息]
- https://github.com/ytk2128/pe32-密码
- https://github.com/frkngksl/欢
- https://github.com/frkngksl/HintInject [提示/名称表]
- https://github.com/ClaudiuGeorgiu/Obfuscapk [安卓]
- https://github.com/magnussen7/Embuche [精灵]
- https://github.com/EgeBalci/amber
- https://github.com/SamLarenN/PePacker
- https://github.com/Systemcluster/wrappe [生锈]
- https://github.com/vsteffen/woody_woodpacker [精灵]
- https://github.com/n4sm/m0dern_p4cker [精灵]
- https://github.com/JonDoNym/peinjector
- https://github.com/craids/AresFramework
- https://github.com/andrew9382/exe_packer
- https://github.com/dr4k0nia/Origami [压缩 .net 程序集]
- https://github.com/mix64/ELFpacker [精灵]
- https://github.com/jnastarot/shibari [Linking multiple PE\PE + files to one]
- 简单的 ELF 运行时打包器,用于创建隐蔽的投放器
- 一个简单的加壳器,可处理所有 PE 文件,通过 XOR 实现对您的 exe 进行加密
- https://github.com/r0ngwe1/petoy [PE]
- 用纯 C 编写的 ELF/PE 打包器
- https://github.com/droberson/ELFcrypt [ELF RC4]
- https://github.com/timhsutw/elfuck [精灵]
- https://github.com/Eronana/packer [PE]
- https://github.com/kuaafif/hXOR-Packer [PE 异或]
- https://github.com/arisada/midgetpack [精灵]
- https://github.com/friedkiwi/netcrypt [.NET]
- https://github.com/89luca89/pakkero [小精灵]
- https://github.com/dimkr/papaw [LZMA]
- https://github.com/akawashiro/sloader [旨在取代glibc的ld-linux.so的ELF加载器]
- https://github.com/MahmoudZohdy/IAT-Obfuscation [IAT混淆]
- https://github.com/ORCx41/EntropyFix [减少熵]
- https://github.com/ORCx41/AtomPePacker [PE X64]
- https://github.com/Lima-X/Win32.Nebula [PE X64]
- https://github.com/frkngksl/Shoggoth [多态加密器]
CLR保护
反拆解
样本解包器
转储修复
- https://github.com/t3ssellate/unmapper
- https://github.com/d35ha/DumpPE
- https://github.com/pr701/fix-arxan
加密变量
- https://github.com/serge-14/encrypted_value [C++]
- https://github.com/momalab/e3 [C++]
- https://github.com/obama-gaming/xor-float [C++]
混淆引擎
- https://github.com/mike1k/perses
- https://github.com/weak1337/Alcatraz
- https://github.com/jnastarot/furikuri
- https://github.com/nickcano/RelocBonus [攻击重定位]
- https://github.com/maoabc/nmmp [Dex]
- https://github.com/CodingGay/BlackObfuscator [Dex]
- https://github.com/d35ha/CallObfuscator [调用混淆]
- https://github.com/nelfo/Milfuscator
- https://github.com/romainthomas/the-poor-mans-obfuscator [精灵/猛男]
- https://github.com/Guardsquare/proguard [Java]
- https://github.com/xiaoweime/WProtect
- https://github.com/DeDf/WProtect
- https://github.com/jokerNi/WProtectSDK
- https://github.com/cxxrev0to1dev/nb_obfuscator
- https://github.com/gmh5225/cerberus [虚拟机]
- https://github.com/CalebFenton/simplify [Java]
- https://github.com/open-obfuscator/dProtect [Java/Kotlin]
截屏
- https://github.com/bavulapati/DXGICaptureApplication [捕获桌面]
- https://github.com/Rick-laboratory/Windows-Screenshotcapture-DirectX/blob/master/main.cpp [DX9]
- https://github.com/lainswork/dwm-screen-shot [DWM]
- https://github.com/kirides/screencapture [DX11]
- https://github.com/bmharper/WindowsDesktopDuplicationSample [DXGI]
- https://github.com/PierreCiholas/GetPixel-vs-BitBlt_GetDIBits [GetPixel]
- https://github.com/D1rkMtr/ScreenShot [BitBlt]
游戏引擎保护:Unreal
- https://github.com/zompi2/Static-Variables-Obfuscator-UE4
- https://github.com/BrUnOXaVIeRLeiTE/SCUE4-Plugin
- https://github.com/gmh5225/UnrealEngine-保护
游戏引擎保护:Unity
游戏引擎保护:来源
开源反作弊系统
- https://github.com/mq1n/NoMercy
- https://github.com/JackBro/BetaShield
- https://github.com/chztbby/RebirthGuard
- https://github.com/GravitLauncher/Avanguard
- https://github.com/Rycooop/Bloom-Anticheat
- https://github.com/AvivShabtay/Stresser [反病毒其实也是反作弊]
- https://github.com/gmh5225/antivirus【防病毒其实也是防作弊】
- https://github.com/D4stiny/PeaceMaker [反病毒其实也是反作弊]
- https://github.com/danielkrupinski/VAC [反向 VAC]
- https://github.com/ApexLegendsUC/anti-cheat-emulator
- https://github.com/ch4ncellor/EAC-Reversal [反向 EAC]
- https://github.com/weak1337/BE-Shellcode [反向 BE Shellcode]
- https://github.com/codetronik/AndroidAntiCheat [安卓平台]
- https://github.com/MrDiamond64/Scythe-AntiCheat [我的世界]
- https://github.com/mateusreb/AntiCheat
- https://github.com/0xrawsec/whids [EDR]
- https://github.com/Neo23x0/Raccine [EDR]
- https://github.com/ION28/BLUESPAWN [EDR]
- https://github.com/AlSch092/UltimateAntiCheat
- https://github.com/JonathanBerkeley/Quack
- Source Engine 服务器端反作弊插件。(CS:S, CS:GO, CS:P, TF2)
- 这是 Knight Online Gamesoft vversion 的反作弊系统
- 为德国角色扮演服务器 GVMP.de 编写的用户模式 C++ 反作弊
- 作弊开发者平台
- https://github.com/ekknod/Anti-Cheat-TestBench [测试台]
- https://github.com/hominsu/bugu【恶意代码检测与混淆】
- 用于阻止 Windows 操作系统上过去、当前和未来进程注入技术的内核安全驱动程序
- https://github.com/DoranekoSystems/cheap-engine [android 中反作弊的示例实现]
- CS:GO 反作弊插件概念验证
- CSGO 的深度学习反作弊
分析框架
检测:挂钩
- https://github.com/hasherezade/pe-sieve
- https://github.com/mike1k/HookHunter
- https://github.com/st4ckh0und/hook-buster
- https://github.com/TupleDev/nullshit
- https://github.com/paranoidninja/EtwTi-Syscall-Hook [仪器回调]
- https://github.com/Luchinkin/device-control-hooks-scanner [设备控制钩子扫描仪]
- https://github.com/ORCx41/KnownDllUnhook [从 \KnownDlls 替换当前加载模块的 .txt 部分]
检测:内存完整性
- https://github.com/afulsamet/integrity
- https://github.com/Midi12/QueryWorkingSetExample
- https://github.com/Deputation/integrity_experiments [仅标题]
检测:附着
检测:Triggerbot & Aimbot
- https://github.com/KANKOSHEV/Detect-MouseClassServiceCallback
- https://github.com/changeofpace/MouHidInputHook
- https://github.com/KelvinMsft/UsbMon
- https://github.com/87andrewh/DeepAimDetector [深度学习]
- https://github.com/hkx3upper/Karlann [键盘]
检测:隐藏
- https://github.com/KANKOSHEV/Detect-HiddenThread-via-KPRCB
- https://github.com/ekknod/Anti-Cheat-TestBench [KPRCB+PTE]
- https://github.com/weak1337/SystemThreadFinder
- https://github.com/mq1n/HiddenModuleDetector
- https://github.com/KelvinMsft/ThreadSpy
- https://github.com/Rwkeith/Nomad [映射驱动]
- https://github.com/Nou4r/ModFinder [映射的Dll]
- https://github.com/1401199262/NMIStackWalk [NMI回调映射驱动]
检测:易受攻击的驱动程序
检测:EFI驱动程序
检测:被黑的管理程序
- https://secret.club/2020/04/13/how-anti-cheats-detect-system-emulation.html
- https://github.com/helloobaby/Nmi-Callback [NMI回调]
- https://github.com/momo5502/ept-hook-detection [检测EPT]
- https://github.com/Ahora57/Hypervisor_detect_ring_0
- https://github.com/jonomango/nohv
检测:虚拟环境
- https://github.com/a0rtega/pafish
- https://github.com/gmh5225/Detection-Hyper-v [超-v]
- https://github.com/Ahora57/MAJESTY-technologies
- https://github.com/therealdreg/anticuckoo [布谷鸟]
- https://github.com/strazzere/anti-emulator [安卓反模拟器]
- https://github.com/LloydLabs/wsb-detect [Windows 沙盒(“WSB”)]
- https://github.com/DevDaveid/AntiDebug-AntiVM [Vbox]
- https://github.com/LukeGoule/compact_vm_detector
检测:HWID
- 在您的 PC 上检索唯一标识符 (HWID) 的所有方法
- https://github.com/medievalghoul/hwid-checker-mg
- https://github.com/weak1337/NvidiaApi
- https://github.com/paradoxwastaken/WindowsHardwareInfo
- https://github.com/lavoiesl/osx-cpu-temp [OSX 的 CPU 温度]
- https://github.com/openhardwaremonitor/openhardwaremonitor
- https://github.com/LibreHardwareMonitor/LibreHardwareMonitor
- https://github.com/lfreist/hwinfo
- https://github.com/KDIo3/PCIBan
检测:SpeedHack
检测:注塑
- https://github.com/mq1n/DLLThreadInjectionDetector
- https://github.com/Nou4r/ModFinder [映射的Dll]
- https://github.com/gmh5225/Driver-WatchOwl [ImageNotify+堆栈跟踪]
- https://github.com/xuanxuan0/TiEtwAgent [ETW]
检测:ESP
检测:墙黑客
检测:混淆
检测:Magisk
- https://github.com/vvb2060/MagiskDetector
- https://github.com/canyie/MagiskKiller
- https://github.com/Dr-TSNG/ApplistDetector
- https://github.com/apkunpacker/MagiskDetection
检测:Frida
签名扫描
信息系统
- https://github.com/Enum0x539/Qvoid-Token-Grabber
- https://github.com/travisfoley/dfirtriage
- https://github.com/AlessandroZ/LaZagne
- https://github.com/thewhiteninja/ntfstool
- https://github.com/mgeeky/ntfs-journal-viewer
- https://github.com/volatilityfoundation/volatility
- https://github.com/volatilityfoundation/volatility3
- 解密并导出浏览器密码,包括 Chromium、Edge 和 Firefox
- https://github.com/gtworek/VolatileDataCollector
- https://github.com/mubix/netview
- https://github.com/rbmm/USN
- https://github.com/rbmm/SearchEx
- https://github.com/ch3rn0byl/ANTfs
- https://github.com/bluecapesecurity/PWF [Windows取证培训]
动态脚本
- https://github.com/can1357/NtLua
- https://github.com/mrexodia/NtPhp
- https://github.com/FastVM/minivm
- https://github.com/jnz/q3vm
内核模式 Winsock
- https://github.com/MiroKaku/libwsk [内核模式 Winsock 库]
模糊器
- https://github.com/0vercl0k/wtf
- https://null2root.github.io/blog/2022/07/21/When-Hypervisor-Met-Snapshot-Fuzzing.html
打开简历
Windows Ring3 回调
- https://github.com/aahmad097/AlternativeShellcodeExec
- https://github.com/Deputation/instrumentation_callbacks [仪器回调]
- https://github.com/secrary/Hooking-via-InstrumentationCallback [仪器回调]
- https://github.com/paranoidninja/EtwTi-Syscall-Hook [仪器回调]
- 通过挂钩 RtlpCallVectoredHandlers 注册 VEH
- ATPMiniDump 回调
- https://github.com/jimbeveridge/readdirectorychanges [ReadDirectoryChangesW]
- https://github.com/blaquee/dllnotif [DllNotification]
- https://github.com/gmh5225/LdrRegisterDllNotification-modify-testing [DllNotification]
Windows Ring0 回调
- https://github.com/gmh5225/kernel-callback-functions-list [回调列表]
- 枚举回调
- 使用 RtlWalkFrameChain 的 ImageNotify 回调
- 符号链接回调
Windows 用户转储分析
Windows 内核转储分析
- https://github.com/gmh5225/Tool-DIYSystemMemoryDump [DIY转储类型]
- https://github.com/0vercl0k/kdmp-parser [Python 3 绑定]
- https://github.com/mrexodia/dumpulator [在小型转储文件中模拟代码]
- https://github.com/0vercl0k/symbolizer [执行跟踪符号器]
签名工具
- https://github.com/mtrojnar/osslsigncode
- https://github.com/gmh5225/chainoffools [CVE]
- https://github.com/mattifestation/WDACTools [解密 p7b]
备份文件
黑色签名
- https://github.com/gmh5225/BlackSignatureDriver
- https://github.com/Harvester57/CodeIntegrity-DriverBlocklist
一些技巧
Windows Ring0
- https://www.unknowncheats.me/forum/general-programming-and-reversing/495279-messagebox-kernel-mode.html [消息框]
- https://back.engineering/01/12/2020/ [页表操作]
- https://git.back.engineering/_xeroxz/PSKP [PTE 挂钩]
- https://github.com/Rythorndoran/PageTableHook [PTE 挂钩]
- https://back.engineering/29/03/2021 [隐藏地址]
- https://github.com/Compiled-Code/be-injector [攻击牛]
- https://github.com/Compiled-Code/eac-mapper [易受攻击的 MmCopyMemory]
- https://github.com/EBalloon/MmCopyMemory [绕过MmCopyMemory]
- https://github.com/Compiled-Code/be-injector [攻击牛]
- https://github.com/gmh5225/Allocating-individual-pages [MmAllocateIndependentPagesEx]
- https://github.com/gmh5225/Hook-HvlSwitchVirtualAddressSpace [HvlSwitchVirtualAddressSpace]
- https://github.com/gmh5225/CallMeWin32kDriver [像win32k.sys一样加载你的驱动程序]
- https://github.com/HypsyNZ/DSEDodge-Signed-Kernel-Driver [利用 PTT 打败 DSE]
- https://github.com/wbenny/KSOCKET [内核伯克利套接字]
- https://github.com/StephanvanSchaik/windows-kernel-rs [用 Rust 编写 Windows 内核驱动程序]
- https://github.com/ekknod/smm [Smm作弊]
- https://github.com/rbmm/KPDB [在驱动中解析PDB]
- https://github.com/GetRektBoy724/KPDB [在驱动中解析PDB]
- https://github.com/gmh5225/FakeEnclave [滥用Enclave的poc]
- https://github.com/gmh5225/LetMeGG [关于如何防止 windbg 中断的 POC]
- https://github.com/UCFoxi/NotifyRoutineHijackThread [劫持PspCreateThreadNotifyRoutine]
- 内核模式下的 GetWindowName
- 内核模式下的 GetWindowInfo
Windows Ring3
- https://secret.club/2021/01/04/thread-stuff.html【反调试】
- https://github.com/utoni/PastDSE [签署泄露的证书]
- https://github.com/Jemmy1228/HookSigntool [签署泄露的证书]
- https://github.com/Sentient111/StealingSignatures [从pe文件窃取签名]
- https://github.com/secretsquirrel/SigThief [从pe文件窃取签名]
- https://github.com/jfmaes/LazySign [假证书]
- https://github.com/Tylous/Limelighter [假证书]
- https://github.com/gmh5225/chainoffools [假证书]
- https://github.com/Adepts-Of-0xCC/MiniDumpWriteDumpPoC [转储内存]
- 一个 x64 Write-What-Where exploit+shellcode 执行漏洞
- 通过注册表修改代码页id注入dll
- https://github.com/huoji120/Etw-Syscall【ETW系统调用】
- https://github.com/weak1337/SkipHook [跳过挂钩]
- https://github.com/ekknod/SetWindowHookEx [将 SetWindowHookEx 用于预注入的 DLL]
- 用于修补 authenticode 签名的 PE 文件(exe、dll、sys ..etc)而不会使现有签名无效或破坏的工具
- 为您的游戏作弊流式传输偏移量的简单程序
- https://github.com/jnastarot/HIGU_ntcall [直接系统调用]
- https://github.com/rbmm/LockFile-Poc [锁定文件]
- 利用 NtUserHardErrorControl 将线程提升到 KernelMode 并实现任意内核 R/W 等的内核漏洞利用
- https://github.com/gmh5225/dll-encryptor [能够在不接触磁盘的情况下流式传输 dll]
- 通过 EnumDisplayMonitors 运行 Shellcode
- 开源 Windows Defender 管理器可以永久禁用 Windows Defender
- 当前进程不使用 ReadProcessMemory 读取内存
- 获取完整性级别为系统的进程令牌并对其进行操作以获取权限提升
- 一个旨在使用被盗的浏览器套接字执行规避通信的库
安卓
- https://github.com/WindySha/bypassHiddenApiRestriction [绕过隐藏的api限制]
- https://github.com/LSPosed/AndroidHiddenApiBypass [绕过隐藏的api限制]
- https://github.com/stars-one/ASCTool【Apk签名破解工具】
- https://github.com/ekknod/usbsn [USB 序列号转换器(仅限 root)]
- https://github.com/gmh5225/Android-privilege-CVE-2022-20452-LeakValue [提权]
- https://github.com/tiann/KernelSU [Android GKI 基于内核的根解决方案]
Windows 安全功能
- https://github.com/yardenshafir/cet-research [英语中英文]
- https://github.com/gmh5225/CET-win10 [英语四级]
- 超级卫士
- https://github.com/gmh5225/QueryShadowStack [影子堆栈]
适用于 Linux 的 Windows 子系统
适用于 Android 的 Windows 子系统
- https://github.com/sergiovillaverde/win11_apk_installer
- https://github.com/LSPosed/MagiskOnWSA
- https://github.com/alesimula/wsa_pacman
- https://github.com/WSA-Community/WSA-Linux-Kernel
- https://github.com/Paxxs/BuildWSA
- https://github.com/LSPosed/MagiskOnWSALocal
- https://github.com/cinit/WSAPatch [让WSA在Windows 10上运行]