# `awesome-game-security` ``` If you find that some links are not working, you can simply replace the username with gmh5225. Or you can send an issue for me. ``` ## How to contribute? - https://github.com/HyunCafe/contribute-practice - https://docs.github.com/en/get-started/quickstart/contributing-to-projects ## Contents - [Game Engine](#game-engine) - [Mathematics](#mathematics) - [Renderer](#renderer) - [3D Graphics](#3d-graphics) - [AI](#ai) - [Image Codec](#image-codec) - [Wavefront Obj](#wavefront-obj) - [Task Scheduler](#task-scheduler) - [Game Network](#game-network) - [PhysX SDK](#physx-sdk) - [Game Develop](#game-develop) - [Game Assets](#game-assets) - [Game Hot Patch](#game-hot-patch) - [Game Testing](#game-testing) - [Game Tools](#game-tools) - [Game Manager](#game-manager) - [Game CI](#game-ci) - [Web3 Game](#web3-game) - [DirectX](#directx) - [OpenGL](#opengl) - [Vulkan](#vulkan) - [Cheat](#cheat) - [Anti Cheat](#anti-cheat) - [Some Tricks](#some-tricks) - [Windows Security Features](#windows-security-features) - [Windows Subsystem for Linux](#windows-subsystem-for-linux) - [Windows Subsystem for Android](#windows-subsystem-for-android) - [Windows Emulator](#windows-emulator) - [Android Emulator](#android-emulator) - [IOS Emulator](#ios-emulator) - [Game Boy](#game-boy) - [Nintendo Switch](#nintendo-switch) - [Xbox](#Xbox) ## Game Engine > Guide - https://github.com/QianMo/Game-Programmer-Study-Notes - https://github.com/Gforcex/OpenGraphic [Graphic Engine & Game Engine lists] - https://github.com/bobeff/open-source-engines [A list of open source game engines] - https://github.com/ThisisGame/cpp-game-engine-book - https://github.com/netwarm007/GameEngineFromScratch - https://forums.unrealengine.com [Unreal] - https://docs.unrealengine.com [Unreal] - https://www.unrealengine.com/resources [Unreal] - https://github.com/donaldwuid/unreal_source_explained [Unreal] - https://github.com/mikeroyal/Unreal-Engine-Guide [Unreal] - https://github.com/Allar/ue5-style-guide [Unreal] - https://github.com/revan1611/UE-Interview-Cheat-Sheet [Unreal] - https://github.com/tomlooman/ue4-tutorials [Unreal] - https://github.com/JaredP94/Unreal-Development-Guides-and-Tips [Unreal] - https://github.com/lettier/3d-game-shaders-for-beginners [Shader] - https://github.com/PardCode/OpenGL-3D-Game-Tutorial-Series [OpenGL] - https://github.com/PardCode/CPP-3D-Game-Tutorial-Series [DirectX] - https://github.com/ssloy/tinyrenderer [Render] - https://github.com/crazyshader/GameDev [Unity] - https://github.com/RyanNielson/awesome-unity [Unity] - https://github.com/shadirvan/Unity-Cheat-Sheet [Unity] - https://github.com/QianMo/Unity-Design-Pattern [Unity Design] - https://github.com/whx-prog/The-Seed-Link-Future [Unity VR] - https://github.com/twohyjr/Metal-Game-Engine-Tutorial [Apple's Metal Api] > Source - https://github.com/EpicGames/UnrealEngine - https://github.com/Unity-Technologies/UnityCsReference [C# reference] - https://github.com/cocos2d/cocos2d-x - https://github.com/cocos/cocos-engine - https://github.com/gmh5225/GameEngine-CRYENGINE - https://github.com/panda3d/panda3d - https://github.com/ValveSoftware/source-sdk-2013 - https://github.com/gmh5225/source-sdk-orangebox - https://github.com/UTINKA/source-engine.2003 - https://github.com/VSES/SourceEngine2007 - https://github.com/nillerusr/source-engine - https://github.com/gmh5225/GoldSourceRebuild [GoldSource engine rebuild] - https://github.com/adriengivry/Overload - https://github.com/gmh5225/GameEngine-MapleEngine - https://github.com/inanevin/LinaEngine - https://github.com/storm-devs/storm-engine - https://github.com/minetest/minetest - https://github.com/godotengine/godot - https://github.com/ScriptedSnark/reGS - https://github.com/nem0/LumixEngine - https://github.com/urho3d/Urho3D - https://github.com/KorokEngine/Korok [Golang] - https://github.com/BoomingTech/Pilot - https://github.com/Sirkles/JoshoEngine-Native - https://github.com/ExplosionEngine/Explosion - https://github.com/danhuynh0803/Campfire - https://github.com/lowenware/dotrix [Rust] - https://github.com/bevyengine/bevy [Rust] - https://github.com/FyroxEngine/Fyrox [Rust] - https://github.com/AmbientRun/Ambient [Rust] - https://github.com/AbyssEngine/AbyssEngine [ARPG] - https://github.com/skylicht-lab/skylicht-engine - https://github.com/ValveSoftware/halflife [Half-Life 1] - https://github.com/SamVanheer/halflife-unified-sdk [Half-Life SDK] - https://github.com/alliedmodders/hl2sdk [Half-Life SDK] - https://github.com/ezhangle/hlmaster [Half-Life Master Server] - https://github.com/MonoGame/MonoGame [.NET] - https://github.com/vchelaru/FlatRedBall [.NET 2D] - https://github.com/nCine/nCine [2D] - https://github.com/gameplay3d/gameplay [2D/3D] - https://github.com/NoelFB/blah [C++ 2D] - https://github.com/Squalr/Squally [C++ 2D] - https://github.com/u3d-community/U3D [C++ 2D/3D] - https://github.com/turbulenz/turbulenz_engine [HTML5] - https://github.com/melonjs/melonJS [HTML5] - https://github.com/egret-labs/egret-core [HTML5] - https://github.com/pixijs/pixijs [HTML5] - https://github.com/TorqueGameEngines/Torque2D [2D] - https://github.com/TorqueGameEngines/Torque3D [3D] - https://github.com/gmh5225/GameEngine-CX3D [3D] - https://github.com/solenum/exengine [C99 3D] - https://github.com/TheCherno/Hazel - https://github.com/duddel/yourgamelib - https://github.com/Serious-Engine/Base - https://github.com/benanil/Castle-Engine [DX11] - https://github.com/OpenArena/engine [quake3] - https://github.com/rbfx/rbfx [C# support and WYSIWYG editor] - https://github.com/BobbyAnguelov/Esoterica - https://github.com/ZDoom/gzdoom [Doom] - https://github.com/L-Spiro/L.-Spiro-Engine-2022 - https://github.com/MohitSethi99/ArcEngine - https://github.com/gscept/nebula - https://github.com/irisengine/iris [cross-platform C++] - https://github.com/WistfulHopes/NightSkyEngine [A fighting game engine written in Unreal Engine 5] - https://github.com/ObEngine/ObEngine [2D+Lua] - https://github.com/harukumo/HorizonEngine [3D rendering engine] - https://github.com/benjinx/Toon [C++] - https://github.com/chrismaltby/gb-studio [GameBoy] - https://github.com/orx/orx [C++] - https://github.com/volcoma/EtherealEngine [C++] - https://github.com/clibequilibrium/EquilibriumEngine [C++] - https://github.com/turanszkij/WickedEngine [C++ 3D] - https://github.com/AustinBrunkhorst/Ursine3D [C++ 3D] - https://github.com/RavEngine/RavEngine [C++ 3D] - https://github.com/asc-community/MxEngine [C++ 3D] - https://github.com/jmorton06/Lumos [C++ 2D/3D] - https://github.com/fredakilla/GPlayEngine [C++ 2D/3D] - https://github.com/crownengine/crown [C++ 2D/3D] - https://github.com/FlaxEngine/FlaxEngine [C++/C# 3D] - https://github.com/stride3d/stride [C# 3D] - https://github.com/Net5F/AmalgamEngine - https://github.com/rxi/kit [pixels] - https://github.com/isadorasophia/murder [pixel] - https://github.com/nitaigao/engine-showcase [Old engine] - https://github.com/PanosK92/SpartanEngine [Research-focused game engine designed for real-time solutions] - https://github.com/OpenXRay/xray-16 [Improved version of the X-Ray Engine] - https://github.com/love2d/love [2D game framework for Lua] - https://github.com/PixelGuys/Cubyz [3D voxel sandbox game written by Zig language] > Game Engine Plugins:Unreal - [Plugin for UE4 to user Rider for Unreal Engine as code editor](https://github.com/JetBrains/RiderSourceCodeAccess) - [Design-agnostic node system for scripting game’s flow in Unreal Engine](https://github.com/MothCocoon/FlowGraph) - [Sample Unreal Engine 5.0.1 C++ Project That Incorporates Dear ImGui](https://github.com/stungeye/UE5-With-Dear-ImGui) - [A set of tools and utilities for use with Unreal Engine projects using ImGui](https://github.com/nakdeyes/UnrealImGuiTools) - [A simple Unreal Engine subsystem to provide a more accurate server world time to clients](https://github.com/Erlite/NetworkTimeSync) - [UE4 UI Texture Validator Plugin](https://github.com/benui-dev/UE-BUIValidator) - [Unreal Engine .NET 6 integration](https://github.com/nxrighthere/UnrealCLR) - [Houdini Engine Plugin for Unreal Engine](https://github.com/sideeffects/HoudiniEngineForUnreal) - [A small tutorial repository on capturing images with semantic annotation from UnrealEngine to disk](https://github.com/TimmHess/UnrealImageCapture) - [UE4 plugin for live2d model](https://github.com/Arisego/UnrealLive2D) - [An Unreal Engine code plugin that adds a custom asset type and editor to the engine](https://github.com/JanKXSKI/AssetTutorialPlugin) - [Unreal Engine 4 Plugin for Lua APIs implementation](https://github.com/rdeioris/LuaMachine) - [Debug Menu for UnrealEngine4](https://github.com/000-aki-000/GameDebugMenu) - ['Dear Imgui' remote access library and application](https://github.com/sammyfreg/netImgui) - [Customizable performance metric charts and STAT commands control panel](https://github.com/DarknessFX/DFoundryFX) - [Unreal Engine plugin providing a set of Hermes endpoints](https://github.com/cdpred/RedTalaria) - [Unreal Engine 4 Plugin for Lua APIs implementation](https://github.com/rdeioris/LuaMachine) - [Copies the argument string to the clipboard and outputs the characters copied to the clipboard](https://github.com/aoharudesu/Clipboard_Tools-UE4) - [Generic graph data structure plugin for ue4](https://github.com/jinyuliao/GenericGraph) > Game Engine Plugins:Unity - [A markdown viewer for unity](https://github.com/gwaredd/UnityMarkdownViewer) - [An integrated solution for authoring / importing / simulating / rendering strand-based hair in Unity](https://github.com/Unity-Technologies/com.unity.demoteam.hair) - [A maintained collection of useful & free unity scripts / library's / plugins and extensions](https://github.com/michidk/Unity-Script-Collection) - [ChatGPT integration with Unity Editor](https://github.com/keijiro/AICommand) > Game Engine Plugins:Lumix - https://github.com/nem0/lumixengine_maps [Map downloader] > Game Engine Detector - https://github.com/walzer/game-engine-detector [Mobile Game] ## Mathematics - https://github.com/nfrechette/rtm - https://github.com/Groovounet/glm - https://github.com/microsoft/DirectXMath - https://github.com/Kazade/kazmath - https://github.com/milakov/int_fastdiv - https://github.com/freemint/fdlibm - https://github.com/Jaysmito101/cgl ## Renderer - https://github.com/bkaradzic/bgfx [Rendering library] - https://github.com/DiligentGraphics/DiligentEngine [Rendering library] - https://github.com/kanition/pbrtbook [Physically Based Rendering: From Theory To Implementation] - https://github.com/keith2018/SoftGLRender - https://github.com/DQLin/VolumetricReSTIRRelease - https://github.com/HackerPoet/NonEuclidean - [A graphics engine designed to run on a single thread on CPU](https://github.com/FHowington/CPUEngine) - https://github.com/paroj/gltut [OpenGL Render] - https://github.com/ashawkey/raytracing [RayTracer] - https://github.com/sultim-t/xash-rt [Xash3D FWGS with a real-time path tracing] - https://github.com/crosire/reshade [A generic post-processing injector for games and video software] - https://github.com/harukumo/HorizonEngine [3D rendering engine] - https://github.com/Patryk27/strolle [Real-time rendering engine] - https://github.com/ssloy/tinyraytracer [A brief computer graphics / rendering course] - https://github.com/freetype/freetype [Render fonts] - https://github.com/MethanePowered/MethaneKit [DirectX 12, Metal & Vulkan] ## 3D Graphics - https://github.com/Mesa3D/mesa - https://github.com/MethanePowered/MethaneKit [DirectX 12, Metal & Vulkan] ## AI - https://github.com/ls361664056/GameAI-paper-list [zh] ## Image Codec - https://github.com/nothings/stb - https://github.com/libjpeg-turbo/libjpeg-turbo - https://github.com/erkkah/tigr - https://github.com/tsoding/olive.c ## Wavefront Obj - https://github.com/tinyobjloader/tinyobjloader - https://github.com/Twinklebear/tobj [Rust] ## Task Scheduler - https://github.com/SergeyMakeev/TaskScheduler ## Game Network > Guide - https://github.com/MFatihMAR/Game-Networking-Resources - https://partner.steamgames.com/doc/api/ISteamNetworkingMessages#functions_sendrecv [Steam] - https://github.com/mcxiaoke/mqtt [mqtt] > Source - https://github.com/cloudwu/skynet - https://github.com/ketoo/NoahGameFrame [Server Engine] - https://github.com/chronoxor/CppServer - https://github.com/Qihoo360/evpp - https://github.com/ValveSoftware/GameNetworkingSockets [Steam] - https://github.com/skywind3000/kcp [KCP] - https://github.com/Unit-X/kcp-cpp [KCP] - https://github.com/TLeonardUK/ds3os [Dark Souls 3] - https://github.com/TLeonardUK/ds2os [Dark Souls 2] - https://github.com/rathena/rathena [MMORPG] - https://github.com/TrinityCore/TrinityCore [Server for WOW] - https://github.com/uNetworking/uWebSockets [WebSockets] - https://github.com/socketio/socket.io [Nodejs] - https://github.com/mqttjs/MQTT.js [mqtt nodejs] - https://github.com/eclipse/paho.mqtt.cpp [mqtt cpp] - https://github.com/topfreegames/pitaya [Server framework] - https://github.com/azerothcore/azerothcore-wotlk [Server for WOW] - https://github.com/arlyon/azerust [Rust Server for WOW] - https://github.com/arlyon/awesome-wow-rust [Rust Server for WOW] - https://github.com/2601677867/One-Click-Run_Source_Server [Server for Source Engine] ## PhysX SDK - https://github.com/NVIDIAGameWorks/PhysX - https://github.com/NVIDIAGameWorks/PhysX-3.4 - https://github.com/bulletphysics/bullet3 ## Game Develop > Guide - https://github.com/Calinou/awesome-gamedev - https://github.com/notpresident35/learn-awesome-gamedev - https://github.com/yrgo/awesome-educational-games - https://github.com/bobeff/open-source-games [A list of open source games] - https://github.com/michelpereira/awesome-open-source-games [Collection of Games] - https://github.com/raizam/gamedev_libraries [A collection of open source c/c++ libraries for gamedev] - https://github.com/gheja/game-design-documents [Game design documents] - https://github.com/Kavex/GameDev-Resources [Game Development resources] - https://github.com/crazyshader/GameDev [Unity] - https://github.com/RyanNielson/awesome-unity [Unity] - https://github.com/QianMo/Unity-Design-Pattern [Unity Design] - https://github.com/michal-z/zig-gamedev [Building game development ecosystem for ziglang] - https://github.com/OTFCG/Awesome-Game-Analysis [Video game tech analysis resources] - https://github.com/killop/anything_about_game [Game Development resources] - https://github.com/TastSong/GameProgrammerStudyNotes [Game Development notes] - https://github.com/P0L3NARUBA/gtav-sourcecode-build-guide [GTA V Source Code Build Tutorial] > Source - https://github.com/PiMoNFeeD/csgo-src [Leaked CSGO] - https://github.com/perilouswithadollarsign/cstrike15_src [Leaked CSGO With CI] - https://github.com/gmh5225/Far-Cry-1-Source-Full [Leaked Far Cry 1] - https://github.com/gmh5225/FarCry [Leaked Far Cry 1] - https://github.com/SwagSoftware/Kisak-Strike [Open Source CSGO] - https://github.com/hampta/csso-src [CSGO Mod] - https://github.com/thomaseichhorn/cs16-client [Rewrote CS1.6] - https://github.com/s1lentq/ReGameDLL_CS [Reversed CS1.6] - https://github.com/Velaron/cs16-client [Reversed CS1.6] - https://github.com/Source2ZE/CS2Fixes [CS2 mod] - https://github.com/gmh5225/Game-GTA-re3 [Reversed GTA III, Vice City] - https://github.com/gta-reversed/gta-reversed-modern [Reimplementation of GTA:SA 1.0 US] - https://github.com/WastedHymn/Grand-Theft-Auto-Modding-Source [Code snippets for Vice City] - https://github.com/SmileyAG/ReCZDS [Reversed CZeror] - https://github.com/Harrison1/unrealcpp [UE4 C++ examples] - https://github.com/QianMo/UE4-FPS-Game [UE4 FPS Game] - https://github.com/KitchenGun/UE4_FPS [UE4 FPS Demo] - https://github.com/tomlooman/SimpleFPSTemplate [UE4 FPS Demo] - https://github.com/tomlooman/EpicSurvivalGame [UE4 FPS Game] - https://github.com/QianMo/UE4-Tank-Game [UE4 Game] - https://github.com/UE-DEMO/UE-UE5-FPS-wlaster [UE5 FPS Game] - https://github.com/gmh5225/UE5-FPS-CryptRaider [UE5 FPS Game] - https://github.com/LeroyTechnologies/ProjectM [UE5 FPS Game] - https://github.com/invi1998/MultiplayerBlasterGame [UE5 FPS Game] - https://github.com/DruidMech/MultiplayerCourseBlasterGame [UE5 FPS Game] - https://github.com/caydenbullock/UE5MultiplayerProject [UE5 horror game with anti-cheat] - https://github.com/perfect-hand/ue5-cardgame [UE5 Card Game] - https://github.com/stackOverflower92/FightingGame-UE5 [UE5 Fighting Game] - https://github.com/gmh5225/UnrealEngine5-UltimateStreetFighters [UE5 StreetFighters Game] - https://github.com/EvelynSchwab/ComponentFuseMechanic [UE5 constraining system] - https://github.com/CobraCodeDev/TP_2DSideScrollerBP [UE5 2D template] - https://github.com/gmh5225/ue5-roll-a-ball-game [UE5 Roll a Ball Game] - https://github.com/tomlooman/ActionRoguelike [UE Roguelike Game] - https://github.com/Unity-Technologies/FPSSample [Unity Game] - https://github.com/OguzKaira/FPS-Movement [Unity FPS] - https://github.com/OguzKaira/SQLite-Unity3D [Unity SQLite] - https://github.com/swordjoinmagic/MoBaDemo [Unity MoBa] - https://github.com/gmh5225/U3D_MiniDNF [Unity mini DNF] - https://github.com/gmh5225/unity-vrchat-template [Unity VRChat Template] - https://github.com/Saukiya/Arknights [Unity Arknights] - https://github.com/ZehMatt/SnakeRoyal [Mini Game With Server] - https://github.com/MKXJun/Super-Fighter [DX11 Mini Game] - https://github.com/MKXJun/Rubik-Cube [DX9/11 Mini Game] - https://github.com/Suprcode/mir2 [MIR2] - https://github.com/Suprcode/mir3-zircon [MIR3] - https://github.com/WolfireGames/overgrowth [Overgrowth] - https://github.com/solidi/hl-mods [Modification For Half-Life] - https://github.com/codingben/maple-fighters [A small online game similar to MapleStory] - https://github.com/gmh5225/WinAPI_MapleStory [WinAPI MapleStory] - https://github.com/ZeromaXHe/MapleStoryCopy [Godot MapleStory] - https://github.com/loqix/Fortnite [Fortnite] - https://github.com/bradharding/doomretro [DOOM] - https://github.com/Daivuk/PureDOOM [DOOM] - https://github.com/NSG650/NtDOOM [Doom running in the NT kernel] - https://github.com/Luxon98/Super-Mario-Bros-game [Remake of Super Mario] - https://github.com/plibither8/2048.cpp [2048] - [An open source re-implementation of RollerCoaster Tycoon 2](https://github.com/OpenRCT2/OpenRCT2) - [This is the old Paradise SPRX BO2 soruce code](https://github.com/gopro2027/ParadiseBO2) - https://github.com/dreamstalker/rehlds [Reverse-engineered HLDS] - https://github.com/AndroidModLoader/AndroidModLoader [Android Mod Loader] - https://github.com/marblexu/PythonPlantsVsZombies [PlantsVsZombies] - https://github.com/mhyousefi/ZombiesVsPlants [PlantsVsZombies] - https://github.com/Fewnity/Counter-Strike-DS-Unity-Project [Unity CS] - https://github.com/Fewnity/Counter-Strike-Nintendo-DS [Nintendo CS] - https://github.com/ppy/osu [osu] - https://github.com/ppy/osu-framework [osu] - https://github.com/dufernst/LegionCore-7.3.5 [wow] - https://github.com/RageProject/5.4.7-Wow-source [wow] - https://github.com/SkyFire/MopCore547 [wow] - https://github.com/Arctium/WoW-Launcher [wow launcher] - https://github.com/skMetinek/Non-Newtonian-New-York [Spider-Man Remastered Mod] - https://github.com/playgameservices/cpp-android-basic-samples [Sample games using the Google Play Games C++ SDK] - https://github.com/pafuhana1213/KawaiiPhysics [Simple fake Physics for UnrealEngine4 & 5] - https://github.com/pafuhana1213/VTuberWithUE4 [UE4 VTuber] - https://github.com/Bratah123/GojoTheSpire [Slay The Spire Remastered Mod] - https://github.com/snesrev/zelda3 [A reimplementation of Zelda 3] - https://github.com/kantam5/DeadByDaylight [Dead By Daylight Copy] - https://github.com/Phobos-developers/Phobos [Red Alert 2: Yuri's Revenge engine extension] - https://github.com/praydog/AutomataMP [NieR] - https://github.com/xinyu-evolutruster/3D-Racing-Game [A racing game based on OpenGL] - https://github.com/ProjectBorealis/PBCharacterMovement [HL2-style, classic FPS movement for UE4 implemented in C++] - https://github.com/Merisho/tx-holdem [Texas Holdem Poker made by JS] - https://github.com/raysan5/raylib [A simple and easy-to-use library to enjoy videogames programming] - https://github.com/NotYetGames/WarriOrb [a Dark-Souls like action platformer using UE4] - https://github.com/pjasicek/OpenClaw [Reimplementation of Captain Claw (1997) platformer] - https://github.com/galaxyhaxz/devilution [Reversed Devilution] - https://github.com/assaultcube/AC [FPS Game] - https://github.com/fishfolk/jumpy [Pixels style] - https://github.com/jynew/jynew [JinYongLegend] - https://github.com/johndpope/pianogame [Piano Game] - https://github.com/gmh5225/QQTang [QQTang] - https://github.com/kvnxiao/storytime [Remake of MapleStory] - https://github.com/deathkiller/jazz2-native [Remake of Jazz Jackrabbit 2] ## Game Assets - https://github.com/Miziziziz/Retro3DGraphicsCollection - https://github.com/HitmanHimself/GOWTool [God of War 2018] - https://github.com/KhronosGroup/glTF [Runtime 3D Asset Delivery] - https://github.com/syoyo/tinygltf [Header only C++11 tiny glTF 2.0 library] - https://github.com/atenfyr/UAssetGUI [Viewing and modifying UE4 game assets] - https://github.com/UETools/UETools [Accessing, reading and deserializing UE4 assets] ## Game Hot Patch - https://github.com/Tencent/xLua - https://github.com/Tencent/InjectFix - https://github.com/focus-creative-games/hybridclr ## Game Testing - https://github.com/UnityTech/GamesTestAutomationExample [The collecting ideas on how to do Test Automation in Games] - https://github.com/nowsprinting/UnityAutomatedQAExamples [Unity Automated QA Guidebook] - https://github.com/AirtestProject/Airtest [UI Automation Framework] - https://github.com/dendibakh/perf-ninja [Performance Analysis] - https://github.com/CookiePLMonster/UptimeFaker [Detecting High PC Uptime] - https://github.com/GameTechDev/PresentMon [Graphics Performance] - https://github.com/gatling/gatling [Server Testing] - https://github.com/aristocratos/btop [Performance Monitor] - https://github.com/Celtoys/Remotery [A realtime CPU/GPU profiler] - https://github.com/Volkanite/Push [Monitor GPU/CPU/RAM performance] - https://github.com/google/orbit [C/C++ Performance Profiler] - https://github.com/wolfpld/tracy [C++ frame profiler] - https://github.com/bombomby/optick [C++ Profiler For Games] - https://github.com/RomanceTheHeart/Automation_Examples [Automating certain tasks in the Unreal editor] - https://github.com/DaedalicEntertainment/ue4-test-automation [Facilitates setting up integration test suits with Unreal Engine 4 Gauntlet] - https://github.com/DenuvoSoftwareSolutions/Onlooker [Tool to collect and visualize memory usage of a process tree] - https://github.com/milostosic/rprof [CPU scope based profiling library] - https://github.com/DarknessFX/DFoundryFX [UE Performance] ## Game Tools - [Play your favorite games in a borderless window; no more time consuming alt-tabs](https://github.com/Codeusa/Borderless-Gaming) - https://github.com/Genymobile/scrcpy [Display and control your Android device] - https://github.com/ryanjon2040/Unreal-Binary-Builder [Build UE Source] - https://github.com/ryanjon2040/UnrealNetworkProfiler [Network Profiler for UE] - [Command line tool for getting the download URL for the latest or specific version of Unity](https://github.com/neogeek/get-unity) - https://github.com/recastnavigation/recastnavigation [Navigation-mesh Toolset for Games] - https://github.com/TensorWorks/UE-Clang-Format [UE Clang-Format configuration] - https://github.com/inflation/goldberg_emulator [Steam emulator] ## Game Manager - https://github.com/JosefNemec/Playnite ## Game CI - https://github.com/game-ci - https://github.com/nikaera/Unity-GameCI-Sample [Unity] ## Web3 Game > Blockchain Guide - https://github.com/unbalancedparentheses/practical_cryptography_and_distributed_ledgers - https://github.com/slowmist/Web3-Project-Security-Practice-Requirements - https://github.com/yjjnls/awesome-blockchain [Guide] - https://github.com/chaozh/awesome-blockchain-cn [CN Guide] - https://en.hackndo.com/ethereum-virtual-machine [EVM] - https://github.com/mektigboy/evm-chad [EVM] - https://github.com/jtriley-eth/the-ethereum-virtual-machine [EVM] - https://github.com/w1nt3r-eth/evm-from-scratch [EVM] - https://github.com/shafu0x/evm-from-scratch-book [EVM] - https://github.com/smlxl/evm.codes [EVM Opcodes Interactive Reference] - https://github.com/Unboxed-Software/solana-course [A complete course for learning Solana] - https://www.rareskills.io/solana-tutorial [A Solana Course By Rareskills] - https://github.com/lambdaclass/lambdaworks [Crypto] - https://github.com/preslavxyz/Web3-Security-Researcher-Roadmap [Web3 Security Researcher Roadmap] - https://github.com/coinspect/learn-evm-attacks [EVM Security] - https://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor [Smart contract audit skills roadmap for beginners] - https://github.com/Dapp-Learning-DAO/Dapp-Learning [Dapp] - https://github.com/contractcops/auditingroadmap [Solidity] - https://github.com/0xcacti/awesome-solidity-dev-tools [Solidity] - https://github.com/mattstam/solidity-template [Solidity Template] - https://github.com/chinmay-farkya/solidity-notes [Solidity Notes] - https://github.com/33357/smartcontract-apps [Solidity CN] - https://github.com/nullity00/web3-resources [Web3 resources] - https://github.com/JoranHonig/awesome-web3-ai-security [web3 ai security] - https://github.com/immunefi-team/Web3-Security-Library [web3 security and programming tutorials/tools] - https://github.com/Malinariy/Solidity-gas-optimizations-tips [Gas optimizations tips] - https://github.com/w3f/Grants-Program [Web3 Foundation Grants Program] - https://github.com/Bonfida/solana-name-service-guide [Solana name service] - https://github.com/smartcontractkit/starter-kits [across the smart contract ecosystem] - https://github.com/smartcontractkit/solana-starter-kit [Example code for using Chainlink on Solana] > Game - https://github.com/aakarkun/unity-web3-skyrim-market [Web3 SkyRim Market - Unity] - https://github.com/0xFableOrg/0xFable [Trading card game] - https://github.com/adrianhajdin/project_web3_battle_game [Web3 NFT Card Game] - https://github.com/MoralisWeb3/unity-web3-game-kit [Unity Web3 Game Kit] - https://github.com/web3gamesofficial/web3games-blockchain [Web3Games blockchain network based on Substrate] - https://github.com/alto-io/game3.js [The Web 3.0 Game Framework] > Smart Contract Template - https://github.com/mattstam/solidity-template [Solidity Template] > SDK - https://github.com/Ankr-network/game-unreal-sdk [Mirage Unreal SDK] - https://github.com/magicblock-labs/Solana.Unity-SDK [Unity-Solana SDK] - https://github.com/Virus-Axel/godot-solana-sdk [Godot Solana SDK] - https://github.com/hyperledger/web3j [Lightweight Java and Android library for integration with Ethereum clients] > Tools - https://github.com/swiss-knife-xyz/swiss-knife [All your EVM tools in one place] - https://github.com/a16z/halmos [A symbolic testing tool for EVM] - https://github.com/fukaoi/smart-token-tool [SPL Token/ NFT issue tool on solana] - https://github.com/cryptoloutre/solana-tools [A bunch of tools to help people in the Solana ecosystem] - https://github.com/costa-group/EthIR [A framework for high-level Analysis of Ethereum Bytecode] - https://github.com/warp-id/solana-trading-bot [Solana Trading Bot] > Unit tests - https://github.com/foundry-rs/foundry - https://github.com/NomicFoundation/hardhat > Security - https://github.com/preslavxyz/Web3-Security-Researcher-Roadmap [Web3 Security Researcher Roadmap] - https://github.com/SunWeb3Sec [Let's make Web3 more secure] - https://github.com/immunefi-team/Web3-Security-Library [web3 security and programming tutorials/tools] - https://github.com/ZhangZhuoSJTU/Web3Bugs [Bugs in Smart Contracts] - https://github.com/kadenzipfel/smart-contract-vulnerabilities [A collection of smart contract vulnerabilities] - https://github.com/cryptostaker2/blockchain-security-audits [Security audits] - https://github.com/obheda12/Solidity-Security-Compendium [Solidity vuln] - https://github.com/0xsanny/solsec [Solana smart contract security] - https://github.com/crytic [Blockchain Security, by @trailofbits] - https://github.com/Quillhash/Solidity-Attack-Vectors [Solidity SmartContract Attack Vectors] - https://github.com/crytic/building-secure-contracts [Guidelines and training material to write secure smart contracts] - https://github.com/crytic/etheno [Ethereum security analysis and testing] - https://github.com/crytic/echidna [Ethereum smart contract fuzzer] - https://github.com/fuzzland/ityfuzz [Ethereum smart contract fuzzer] - https://github.com/secureum/DeFi-Security-Summit-Stanford [DEFI Focus Smart Contract Security Capture the Flag] - https://github.com/go-outside-labs/blockchain-hacking [hacking] - https://github.com/Decurity/abi-decompiler [Recover ABI of EVM smart contracts] - https://github.com/pcaversaccio/reentrancy-attacks [Historical Collection of Reentrancy Attacks] - https://mythx.io [Static Analyzer] - https://github.com/crytic/slither [Static Analyzer] - https://github.com/ConsenSys/mythril [Static Analyzer] - https://github.com/Picodes/4naly3er [Static Analyzer] - https://github.com/Quillhash/QuillAudit_Auditor_Roadmap [Become a Smart Contract Auditor] - https://github.com/d-xo/weird-erc20 [Weird ERC20] - https://github.com/slowmist/solana-smart-contract-security-best-practices [Solana security] - https://github.com/JoranHonig/awesome-web3-ai-security [web3 ai security] - https://github.com/costa-group/EthIR [A framework for high-level Analysis of Ethereum Bytecode] > Contract source code - https://github.com/tangtj/bsc-contract-database [BSC] - https://github.com/smartcontractkit/smart-contract-examples [ERC] ## DirectX > Guide - https://github.com/planetchili/hw3d [C++ 3D DirectX Tutorial] - https://github.com/jpvanoosten/LearningDirectX12 [DX12] - https://github.com/PAMinerva/LearnDirectX [DX12] - https://github.com/MKXJun/DirectX11-With-Windows-SDK [DX11 zh] - https://github.com/d3dcoder/d3d12book [DX12] - https://github.com/pkurth/D3D12Renderer [DX12] > Hook - https://github.com/rdbo/DX11-BaseHook [DX11 Imgui] - https://github.com/DrNseven/D3D12-Hook-ImGui [DX12 Imgui] - https://github.com/niemand-sec/DirectX11Hook [DX11 Imgui] - https://github.com/guided-hacking/GH_D3D11_Hook [DX11] - https://github.com/gogo9211/Discord-Overlay-Hook [DX11] - https://github.com/ocornut/imgui/commit/923bd2fd217c1dc1e75fa92b0284d3817904988b [DX11/12 ResizeBuffers] - https://github.com/marlkiller/d3dhook_imgui [d3d opengl hook imgui x86/x64] - [Universal graphical hook for a D3D9-D3D12, OpenGL and Vulkan based games](https://github.com/Rebzzel/kiero) - https://github.com/jmpews/Dobby [a lightweight, multi-platform, multi-architecture hook framework] - https://github.com/Sh0ckFR/Universal-Dear-ImGui-Hook [An universal Dear ImGui Hook] - https://github.com/bruhmoment21/UniversalHookX [DX/OpenGL/Vulkan] > Tools - https://github.com/visotw/3d9 [Fixing broken stereoscopic effects in DX11 games] > Emulation - https://github.com/code-tom-code/Software_D3D9 [DX9] > Compatibility - https://github.com/CnCNet/cnc-ddraw [Old Game] - https://github.com/microsoft/D3D9On12 [The Direct3D9-On-12 mapping layer] > Overlay - https://github.com/SeanPesce/Direct3D9-Overlay ## OpenGL > Guide - https://github.com/JoeyDeVries/LearnOpenGL > Source - https://github.com/brackeen/glfm [Write OpenGL ES code in C/C++] > Hook - https://github.com/bruhmoment21/UniversalHookX ## Vulkan > Guide - https://github.com/googlesamples/android-vulkan-tutorials > API - https://github.com/liblava/liblava [Modern and easy-to-use library for Vulkan] - https://github.com/corporateshark/lightweightvk > Hook - https://github.com/Rebzzel/kiero [X86/64 Windows] - https://github.com/bruhmoment21/UniversalHookX [X86/64 Windows] - https://github.com/DrNseven/Vulkan-Hook [X86/64 Windows] - https://github.com/Sh0ckFR/Universal-Dear-ImGui-Hook - https://github.com/Halen84/ImGuiRDR2Hook ## Cheat > Guide - https://github.com/dsasmblr/game-hacking - https://github.com/dsasmblr/hacking-online-games - https://github.com/kovidomi/game-reversing - https://github.com/TheZong/Game-Hacking - https://github.com/mytechnotalent/Reverse-Engineering - https://github.com/wtsxDev/reverse-engineering - https://github.com/mytechnotalent/Hacking-Windows - https://github.com/kotae4/intro-to-gamehacking - https://blog.can.ac/author/can1357 - https://github.com/SinaKarvandi/Hypervisor-From-Scratch [Hypervisor] - https://secret.club - https://back.engineering - https://vollragm.github.io - https://www.triplefault.io - https://advancedvectorextensions.github.io - https://bright.engineer - https://reversing.info - https://www.unknowncheats.me - https://forum.ragezone.com - https://guidedhacking.com - https://github.com/guided-hacking - https://gamehacking.academy - https://github.com/GameHackingAcademy - https://areweanticheatyet.com [A list of games using anti-cheats] - https://github.com/aclist/aclist.github.io [Anti-cheat compatibility list] - https://github.com/imadr/Unity-game-hacking [Unity] - https://vollragm.github.io/posts/unity-reversing [Unity] - https://wiki.cheatengine.org/index.php?title=Mono [CE Mono] - https://github.com/krampus-nuggets/ce-tutorial [CE] - https://il2cppdumper.com [IL2CPP] - https://www.unknowncheats.me/forum/unity/465283-il2cppruntimedumper.html [IL2CPP] - https://github.com/shalzuth/NativeNetSharp [Injecting C# code] - https://github.com/januwA/game-reversed-study [CE Guide zh] - https://github.com/csgohacks/master-guide [CSGO Guide] - [different-ways-hooking](https://www.unknowncheats.me/forum/general-programming-and-reversing/154643-different-ways-hooking.html) [Hook Guide] - http://pwnadventure.com [Hackable Game] - https://github.com/GameCrashProject/UE4-Hacking-Guideline [Unreal] - https://github.com/TimMisiak/WinDbgCookbook [WinDbg] - https://github.com/anhkgg/awesome-windbg-extensions [WinDbg] - [Undetected Cheat Engine](https://www.unknowncheats.me/forum/anti-cheat-bypass/504191-undetected-cheat-engine-driver-2022-bypass-anticheats-eac.html) - [Guide about remote Windows kernel debugging](https://github.com/konstantin89/windows-kernel-debugging-guide) - https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Games.md [Game Hacking] - https://github.com/cragson/osmium [C++ Framework for external cheats] - https://github.com/WangXuan95/Xilinx-FPGA-PCIe-XDMA-Tutorial [DMA Tutorial] - https://github.com/NetKingJ/awesome-android-security [Android (Samsung) Security Research References] - https://github.com/gregkh/kernel-development [Linux kernel development] > Debugging - https://github.com/stars/gmh5225/lists/debugger [List] - https://github.com/cheat-engine/cheat-engine - https://github.com/SinaKarvandi/Hypervisor-From-Scratch [Hypervisor] - https://github.com/JasonGoemaat/CheatEngineMonoHelper [CE Mono Helper] - https://github.com/DoranekoSystems/frida-ceserver [CE Server For IOS] - https://github.com/DoranekoSystems/ceserver-ios [Porting ceserver to iOS.Dynamic analysis] - https://github.com/gmh5225/cheat-engine-ceserver-pcileech [CE Server For Pcileech] - https://github.com/user23333/veh [CE Plugin For Manualmap VEH Dll] - https://github.com/x64dbg/x64dbg - https://github.com/marakew/syser - https://github.com/noword/GDB-Windows-Binaries [GDB] - https://github.com/ajkhoury/ReClassEx - https://github.com/ReClassNET/ReClass.NET - https://github.com/niemand-sec/ReClass.NET-DriverReader [ReClass DriverReader] - https://github.com/BeneficialCode/KReClassEx [Kernel ReClassEx] - https://github.com/imerzan/ReClass-DMA [ReClass DMA] - https://github.com/Metick/CheatEngine-DMA [CheatEngine DMA] - https://github.com/x64dbg/DotX64Dbg - https://github.com/imugee/xdv - https://github.com/eteran/edb-debugger [For Linux] - https://github.com/korcankaraokcu/PINCE [For Linux] - https://github.com/mrexodia/TitanHide - https://github.com/Air14/HyperHide - https://github.com/HyperDbg/HyperDbg - https://github.com/3526779568/vt-debuger - https://github.com/teemu-l/execution-trace-viewer - https://github.com/changeofpace/Force-Page-Protection [Bypass Remap Memory] - https://github.com/icsharpcode/ILSpy [For Unity] - https://github.com/dnSpy/dnSpy [For Unity] - https://github.com/HoLLy-HaCKeR/dnSpy.Extension.HoLLy [For Unity] - https://github.com/mandiant/dncil [For Unity] - https://github.com/hugsy/CFB [Monitor IRP] - https://github.com/Kharos102/IOCTLDump [Monitor IRP] - https://ioninja.com/downloads.html [Protocol Analyzer] - https://github.com/wilszdev/SteamAntiAntiDebug [Steam] - https://github.com/H5GG/H5GG [IOS cheat engine] - https://github.com/ri-char/pwatch [HWBP on linux/android] - https://github.com/enenH/pwatch-c [HWBP on linux/android] - https://github.com/Ylarod/hardware-breakpoint [HWBP on linux/android] > Packet Sniffer&Filter - https://github.com/WPO-Foundation/win-shaper - https://github.com/wiresock/ndisapi - https://github.com/Akebi-Group/Akebi-PacketSniffer - https://github.com/basil00/Divert [Packet Divert] - https://github.com/fksvs/inject - https://github.com/hercul3s/Packet-Sniffer [Packet Logger/Decryptor] > Packet Capture&Parse - https://github.com/seladb/PcapPlusPlus [Pcap] - https://github.com/nmap/npcap > SpeedHack - https://github.com/absoIute/Speedhack - https://github.com/Letomaniy/Speed-Hack - https://github.com/IamSanjid/ce_speed_hack > RE Tools - https://dogbolt.org - https://github.com/msd0pe-1/cve-maker [Tool to find CVEs and Exploits] - https://github.com/mentebinaria/retoolkit [Reverse Engineer's Toolkit] - https://github.com/stevemk14ebr/RETools - https://github.com/BataBo/ACEPatcher [.NET Patcher] - https://github.com/waryas/KACE [Emulate Drivers in RING3 with self context mapping or unicorn] - https://github.com/VollRagm/PTView [Browse Page Tables on Windows] - https://github.com/iBotPeaches/Apktool [Apk] - https://github.com/user1342/Obfu-DE-Scate [Apk] - https://github.com/Genymobile/scrcpy [Display and control your Android device] - https://github.com/barry-ran/QtScrcpy [Display and control your Android device] - https://github.com/guided-hacking/GH-Offset-Dumper [Scans for signatures and netvars and dumps their relative offsets] - https://github.com/guided-hacking/GH-Entity-List-Finder [Scans game processes for most likely entity list addresses] - https://github.com/rednaga/APKiD [PEiD for Android] - https://github.com/Col-E/Recaf [Java] - https://github.com/tomvita/SE-tools [Nintendo Switch] - https://github.com/StudentBlake/XCI-Explorer [XCI Explorer] - https://github.com/Anonym0ose/JitDumper [A CIL method body dumper] - https://github.com/cfig/Android_boot_image_editor [A tool for reverse engineering Android ROM images] - https://github.com/hasherezade/pe-bear [PE Viewer] - https://github.com/zodiacon/TotalPE2 [PE Viewer] - https://github.com/APKLab/APKLab [Android Reverse-Engineering Workbench for VS Code] - https://github.com/evild3ad/MemProcFS-Analyzer [Windows Forensic Analysis] - https://github.com/eybisi/kavanoz [Statically unpacking common android banker malware] - https://github.com/cyberark/PipeViewer [Shows detailed information about named pipes in Windows] - https://github.com/cursey/regenny [Reconstruct structures and generate header files] - https://github.com/zodiacon/EtwExplorer [View ETW Provider manifest] - https://github.com/DoranekoSystems/ceserver-ios [Porting ceserver to iOS.Dynamic analysis] - https://github.com/VoidSec/ioctlpus [Be used to make DeviceIoControl requests with arbitrary inputs] - https://github.com/horsicq/Nauz-File-Detector [Linker/Compiler/Tool detector] - https://github.com/gcarmix/HexWalk [Hex Viewer/Editor/Analyzer] - https://github.com/RomanRybachek/ioctl_helper [GUI tool for sending IOCTL to windows drivers] - https://github.com/sevaa/dwex [DWARF Explorer] - https://github.com/katahiromz/RisohEditor [Win32 resource editor] - https://github.com/Fadi002/de4py [Toolkit for python reverse engineering] - https://github.com/skelsec/minidump [Python library to parse and read Microsoft minidump file format] - https://github.com/zodiacon/QuickAsm [x86/x86 assembler and emulator] - https://github.com/skylot/jadx [Dex to Java decompiler] - https://github.com/google/android-classyshark [Android and Java bytecode viewer] - https://github.com/marin-m/vmlinux-to-elf [vmlinux to elf] - https://github.com/emlinhax/DbgViewEx [A tool to log ETW Events and system debug logs] - https://github.com/amosshi/binaryinternals [View Internals of Binary File] - https://github.com/WerWolv/ImHex [A Hex Editor for Reverse Engineers] - https://github.com/microsoft/pdblister [Faster version of `symchk /om` for generating PDB manifests] - https://github.com/yaxinsn/vermagic [Change vermagic and CRCs of a Linux Kernel Module] - https://github.com/rhboot/pesign [Linux tools for signed PE-COFF binaries] - https://github.com/SV-Foster/UnSign [Remove all digital signatures from PE/COFF executable] - https://github.com/colinsenner/PECleaner [Strips all RICH header information from x86/x64 binaries] - https://github.com/kouzhudong/AntiHook [Enum and Remove Hook in Windows] - https://github.com/jixiaoyong/ApkSigner [Android Apk Sign Tool] - https://github.com/4d61726b/VirtualKD-Redux [A revival and modernization of VirtualKD] - https://github.com/ax/apk.sh [A Bash script that makes reverse engineering Android apps easier] - https://github.com/vm03/payload_dumper [Android OTA payload dumper] - https://github.com/ssut/payload-dumper-go [Android OTA payload dumper] - https://github.com/MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass [Xiaomi HyperOS BootLoader Bypass] - https://github.com/null-luo/btrace [Android App Dynamic Behavior Tracking Tool using eBPF] - https://github.com/michaelmsonne/SignToolGUI [signtool GUI] > Fix VMP - https://github.com/Obfuscator-Collections/VMProtect - https://github.com/wallds/NoVmpy - https://github.com/gmh5225/VMP-Vmp3_64bit_disasm-prerelease- - https://github.com/gmh5225/Vmp3_utils - https://github.com/archercreat/titan - https://github.com/NaC-L/Mergen - https://github.com/fjqisba/VmpHelper > Fix Themida - https://github.com/sodareverse/TDE - https://github.com/ergrelet/themida-unmutate > Fix OLLVM - https://bbs.pediy.com/thread-272414.htm - https://github.com/obpo-project/obpo-plugin > Dynamic Binary Instrumentation - https://github.com/hzqst/unicorn_pe - https://github.com/Nitr0-G/PeVisor [PE] - https://github.com/googleprojectzero/TinyInst - https://github.com/revsic/cpp-veh-dbi - https://github.com/ZehMatt/CovCane - https://github.com/bitdefender/river - https://github.com/beehive-lab/mambo [ARM] - https://github.com/DynamoRIO/drmemory - https://github.com/aroxby/dynre-x86 - https://github.com/WaterlooBridge/adbi [For Android] - https://github.com/crmulliner/adbi [For Android] > Launcher Abuser - https://github.com/Ricardonacif/launcher-abuser > Bypass PatchGuard - https://github.com/armasm/EasyAntiPatchGuard - https://github.com/9176324/Shark - https://github.com/gmh5225/Patchguard-2023 [Shark] - https://github.com/hfiref0x/UPGDSED [File] - https://github.com/Mattiwatti/EfiGuard [EFI] - https://github.com/zzhouhe/PG1903 [Demo NX] - https://gist.github.com/gmh5225/0a0c8e3a2d718e2d6f9b6a07d5e0f80a [PG CTX] - https://github.com/gmh5225/QuickPGTrigger [Stress Testing] - https://github.com/tandasat/Sushi [Monitoring PG] - https://github.com/gmh5225/Disabling-Hyper-V [Disable Hyper-V] - https://github.com/AdamOron/PatchGuardBypass - https://github.com/zer0condition/Demystifying-PatchGuard - https://github.com/4l3x777/dse_pg_bypass [DSE & PG bypass via BYOVD attack] - https://github.com/i32-Sudo/VulnerablePatchGuardExploit - https://github.com/emlinhax/tableflipper [partially disable patchguard up to win11 21H2] > Driver Signature enforcement - https://github.com/gmh5225/dse_hook - https://github.com/gmh5225/Dse-Patcher-2 - https://github.com/gmh5225/DisableDSE > Windows Kernel Explorer - https://github.com/NullArray/WinKernel-Resources [Guide] - https://github.com/supermanc88/Document/tree/master/Windows%20Driver%20Development [Guide] - https://windiff.vercel.app/# [Diff] - https://github.com/gmh5225/ntoskrnl_file_collection [Various versions of ntoskrnl files] - https://github.com/gmh5225/win32k_file_collection [Various versions of win32k files] - https://github.com/gmh5225/win32k_file_collection2 [Various versions of win32k files] - https://github.com/jiubanlo/WinNT5_src_20201004 [Leaked Windows XP Source] - https://github.com/BlackINT3/OpenArk [Tool] - https://github.com/BeneficialCode/WinArk [Tool] - https://github.com/hfiref0x/KDU [Kernel Driver Utility Tool] - https://github.com/jthuraisamy/TelemetrySourcerer [Enumerate and disable callbacks/ETW] - https://github.com/progmboy/openprocmon [open source process monitor] - https://github.com/winsiderss/systeminformer [Tool] - https://github.com/0xcpu/ExecutiveCallbackObjects [Callback] - https://github.com/0xcpu/WinAltSyscallHandler [AltSystemCallHandlers] - https://github.com/DownWithUp/CallMon [AltSystemCallHandlers] - https://github.com/everdox/InfinityHook [ETW Hook] - https://github.com/AyinSama/Anti-AntiDebuggerDriver [ETW Hook] - https://github.com/gmh5225/AcDrv [ETW Hook] - https://github.com/FiYHer/InfinityHookPro [ETW Hook Ex] - https://github.com/gmh5225/ETWHOOK-InfinityHookClass [ETW Hook Ex] - https://github.com/DearXiaoGui/InfinityHookPro-main [ETW Hook WIN11] - https://github.com/ThomasonZhao/InfinityHookProMax [ETW Hook WIN11] - https://github.com/Oxygen1a1/InfinityHook_latest [ETW Hook WIN11] - https://github.com/gmh5225/PDF-PMC-X86 [A Study on PMI in x86-Architecture] - https://github.com/KelvinMsft/ThreadSpy [PMI Callback] - https://github.com/KelvinMsft/PerfMon [PMI Callback] - https://github.com/gmh5225/PMI-hpc [PMI] - https://github.com/marcusbotacin/BranchMonitoringProject [PMI] - https://github.com/gmh5225/NMI-EnumNmiCallback [Enumerate NMI] - https://github.com/gmh5225/Disable-nmi-callbacks [Disable NMI] - https://github.com/gmh5225/NMI-nmi_callback [Triggering NMI] - https://github.com/gmh5225/Kernel_Anti-Cheat [NMI] - https://github.com/jlgreathouse/AMD_IBS_Toolkit [AMD Sampling] - https://github.com/intelpt/WindowsIntelPT [Intel PT] - https://github.com/CristiNacu/ingsoc [Intel PT] - https://github.com/DProvinciani/pt-detector [Intel PT] - https://github.com/googleprojectzero/winafl [Intel PT Fuzzer] - https://github.com/intelpt/winipt [ipt.sys] - https://github.com/australeo/libipt-rs [ipt.sys] - https://github.com/intelpt/processor-trace [Intel PT Decoder] - https://github.com/gmh5225/Driver-intel-PEBs-LoopHPCs [Intel PEBs] - https://github.com/libiht/libiht [Intel Hardware Trace Library] - https://github.com/ilovecsad/Ark [Tool] - https://github.com/gmh5225/ntoskrnl_file_collection [Ntoskrnl Version] - https://github.com/gmh5225/win32k_file_collection [Win32k Version] - https://github.com/gmh5225/win32k_file_collection2 [Win32k Version] - https://github.com/gmh5225/MSSymbolsCollection [Kernel Symbols] - https://github.com/am0nsec/wkpe [Enumerate VAD] - https://github.com/armvirus/DriverDllFInder [Find Driver Useless Memory] - https://github.com/MahmoudZohdy/APICallProxy [Windows API Call Obfuscation] - https://github.com/Spuckwaffel/Simple-MmcopyMemory-Hook [Hook MmcopyMemory] - https://github.com/VollRagm/PTView [Browse Page Tables on Windows] - https://github.com/misc0110/PTEditor [PT Editor] - https://github.com/IcEy-999/Ntoskrnl_Viewer [Ntoskrnl Viewer] - https://github.com/ekknod/Nmi [Blocking NMI interrupts] - https://github.com/EquiFox/KsDumper [Dumping processes using the power of kernel space] - https://github.com/mastercodeon314/KsDumper-11 [Classic and legendary KsDumper] - https://github.com/not-matthias/Nemesis [Dumping processes using the power of kernel space] - https://github.com/allogic/KDBG [Tool] - https://github.com/backengineering/Voyager [A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)] - https://github.com/gmh5225/Voyager [A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)] - https://github.com/NurdAlert/modded-voyager - https://github.com/gmh5225/Fortnite-VoyagerTF [Voyager for Fortnite] - https://github.com/repnz/apc-research [APC Internals Research Code] - https://github.com/intel/pcm [Processor Counter Monitor] - https://github.com/ChengChengCC/Ark-tools [Some kernel research] - https://github.com/alal4465/KernelMon [Monitoring Windows Kernel Drivers] - https://github.com/gmh5225/Practical-Reverse-Engineering-Solutions [DPC+APC] - https://github.com/br-sn/CheekyBlinder [Enumerating and removing kernel callbacks using signed vulnerable drivers] - https://github.com/GetRektBoy724/DCMB [Removing kernel callbacks] - https://github.com/Air14/KDBGDecryptor [A simple example how to decrypt kernel debugger data block] - https://github.com/FaEryICE/MemScanner [Memory scanner] - https://github.com/irql/nokd [Kernel debugger protocol] > Magisk - https://github.com/PShocker/Zygisk-MagiskHide - https://github.com/longpoxin/hideroot - https://github.com/canyie/Riru-MomoHider - https://github.com/newbit1/rootAVD [root AVD] - https://github.com/Fox2Code/FoxMagiskModuleManager [A module manager for Magisk] - https://github.com/Dr-TSNG/ZygiskOnKernelSU [Run Zygisk on KernelSU] - https://github.com/svoboda18/magiskboot [Boot Image Modification Tool] - https://github.com/xiaoxindada/magiskboot_ndk_on_linux [Boot Image Modification Tool] - https://github.com/ookiineko/magiskboot_build [Boot Image Modification Tool] - https://github.com/gmh5225/magiskboot-linux [Use GitHub Actions to build magiskboot] - https://github.com/the-dise/EasyPixel [Magisk module that disguises a device under Google Pixel] - https://github.com/gmh5225/MagiskHide [Portable MagiskHide] - https://github.com/lico-n/ZygiskFrida [Injects frida gadget using zygisk] - https://github.com/Admirepowered/Zygisk_mod [Standalone implementation of Zygisk] - https://github.com/anasfanani/Magisk-Tailscaled [Magisk module for running Tailscale] - https://github.com/j-hc/FlagSecurePatcher [Disable flag secure and screenshot listeners] > Frida - https://github.com/CrackerCat/strongR-frida-android - https://github.com/gmh5225/frida-ue4dump [UE4] - https://github.com/jcalabres/hook-updater [Update Frida hooks automatically] - https://github.com/gmh5225/frida-boot [A binary instrumentation workshop, with Frida, for beginners] - https://github.com/smartdone/Frida-Scripts [Some scripts] - https://github.com/0xdea/frida-scripts [Some scripts] - https://github.com/SeeFlowerX/frida-smali-trace [Smali trace] - https://github.com/Ylarod/Florida [anti-detection version of frida-server] - https://github.com/noobpk/frida-android-hook [Trace classes/functions/and modify the return values] - https://github.com/apkunpacker/AntiFrida_Bypass [Bypass Some AntiFrida Checks] - https://github.com/Abbbbbi/Frida-Seccomp [Frida-Seccomp] - https://github.com/rednaga/frida-stack [Getting better stacks and backtraces in Frida] > Hook ART(android) - https://github.com/PAGalaxyLab/YAHFA - https://github.com/canyie/pine > Android Terminal Emulator - https://github.com/termux/termux-app - https://github.com/sylirre/neotty - https://github.com/jackpal/Android-Terminal-Emulator - https://github.com/NeoTerrm/NeoTerm > Android File Explorer - https://github.com/nzcv/note [Guide-zh] - https://github.com/iBotPeaches/Apktool - https://github.com/pxb1988/dex2jar - https://github.com/skylot/jadx [Dex to Java decompiler] - https://github.com/LuckyPray/DexKit-Android [dex deobfuscator] - https://github.com/LSPosed/DexBuilder [Generate dex file by c++] - https://github.com/rednaga/APKiD [PEiD for Android] - https://github.com/APKLab/APKLab [Android Reverse-Engineering Workbench for VS Code] - https://github.com/pgp/XFiles [File explorer for (rooted) Android] - https://github.com/gmh5225/AdbFileManager [File manager using ADB protocol] - https://github.com/MuntashirAkon/AppManager [A full-featured package manager and viewer] - https://github.com/pgp/XFiles [A general-purpose file explorer for (rooted) Android] - https://github.com/Raival-e/File-Explorer [An Android file explorer] > Android Memory Explorer - https://github.com/misc0110/PTEditor [PT Editor] - https://github.com/joaomlneto/procmap - https://github.com/kp7742/MemDumper [Dump] - https://github.com/mrcang09/Android-Mem-Edit - https://github.com/ExploitTheLoop/writemem - https://github.com/abcz316/rwProcMem33 [Linux read & write process memory module] - https://github.com/ri-char/rwMem [The fork version of rwProcMem33] - https://github.com/IAIK/armageddon [Cache attacks on ARM] - https://github.com/tamirzb/CVE-2021-1961 [CVE RW] - https://github.com/MJx0/KittyMemory [Runtime code patching] - https://github.com/gmh5225/KittyMemory-IOS [Runtime code patching for IOS] - https://github.com/vrolife/mypower [Memory scanner] - https://github.com/DoranekoSystems/memory_server [Memory scanner & analyzer with REST API] - https://github.com/KuhakuPixel/AceTheGame [Game Hacking Tools] - https://github.com/gmh5225/Android-MemoryTool [RPM] - https://github.com/Anonym0usWork1221/C-Android-Memory-Tool [RPM] > Android Application CVE - https://github.com/nahid0x1/CVE-2024-0044 [a vulnerability affecting Android version 12 & 13] > Android Kernel CVE - https://github.com/ScottyBauer/Android_Kernel_CVE_POCs [List] - https://github.com/tangsilian/android-vuln [List] - https://github.com/jsirichai/CVE-2019-2215 [Root for Pixel 2/XL] - https://github.com/bluefrostsecurity/CVE-2020-0041 [Root for Pixel 3] - https://github.com/j4nn/CVE-2020-0041 [Root for Pixel 3] - https://github.com/polygraphene/DirtyPipe-Android [Root for Pixel 6] - https://github.com/tiann/DirtyPipeRoot [Root for Pixel 6] - https://github.com/Markakd/bad_io_uring [Root for Pixel 6] - https://github.com/0x36/Pixel_GPU_Exploit [Root for Pixel7/8 Pro with Android 14] > Android Bootloader Bypass - https://github.com/MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass [Xiaomi HyperOS BootLoader Bypass] > Android ROM - https://xdaforums.com [Guide] - https://github.com/Akipe/awesome-android-aosp [Guide] - https://github.com/musabcel/android_rom_list [List] - https://github.com/vm03/payload_dumper [Android OTA payload dumper] - https://developer.android.com/studio/run/win-usb [Google USB Driver] - http://www.miui.com/unlock/download.html [Unlocker for xiaomi] - https://miuiver.com/miflash [MiFlash] - https://xiaomifirmwareupdater.com [Xiaomi Firmware Updater] - https://sourceforge.net/projects/recovery-for-xiaomi-devices/files [TWRP for xiaomi] - https://github.com/cfig/Android_boot_image_editor [Android ROM tool] - https://github.com/badabing2005/PixelFlasher [Android ROM tool for Pixel] - https://github.com/Ctapchuk/android_bootable_recovery-OFRP [OrangeFox Recovery] > Android Device Trees - https://github.com/MiCode/kernel_devicetree [xiaomi device trees] - https://github.com/cupid-development/ [xiaomi device trees] - https://github.com/ymdzq/OFRP-device_xiaomi_mondrian [OFRP for Redmi K60 (mondrian)] - https://github.com/flakeforever/device_xiaomi_mondrian [Pixel Experience Plus for for Redmi K6/POCO F5 Pro] > Android Kernel Source - https://source.android.com/docs/setup/build/building-kernels [Docs] - https://android.googlesource.com/kernel/manifest/+refs [manifest] - https://android.googlesource.com/kernel/manifest [manifest] - https://android.googlesource.com/kernel/common [GKI] - https://github.com/aosp-mirror/kernel_common [GKI] - https://www.android-x86.org [X86] - https://blissos.org [X86] - https://github.com/MiCode/Xiaomi_Kernel_OpenSource [xiaomi kernel] - https://github.com/xiaomi-sm8450-kernel [xiaomi kernel] - https://github.com/Danda420/kernel_xiaomi_sm8250 [xiaomi kernel for POCO F3/F4] - https://github.com/LowTension/android_kernel_xiaomi_sm8475 [Pixel Experience Plus for for Redmi K6/POCO F5 Pro] - https://github.com/GrapheneOS-Archive/kernel_msm-coral [Pixel 4/4XL/4a] - https://github.com/msnx/KernelSU-Pixel4XL [KernelSU for Google Pixel4XL] - https://github.com/universal5433/android_kernel_samsung_universal5433 [samsung 15433] - https://github.com/SM7325-AE/android_kernel_motorola_dubai [Moto Edge 30] - https://github.com/mylove90/pc_ginkgo [Redmi Note 8/8T with KernelSU] - https://github.com/fiqri19102002/android_kernel_xiaomi_sweet [Redmi Note 10 Pro] - https://github.com/ExWhyZed9/android_kernel_gki_common_5.10 [Redmi Note 11T Pro(+) / POCO X4 GT] - https://github.com/psavarmattas/android_kernel_oneplus_sm7250-WKSU [KernelSU for Oneplus] - https://github.com/huawei-mediatek-devs/android_kernel_huawei_mt6761 [huawei mt6761] - https://github.com/pascua28/android_kernel_samsung_sm7150 [samsung sm7150] - https://github.com/devhunter1/A146B-KSU [KernelSU for SAMSUNG A14 5G (a14x)] - https://github.com/utziacre/android_kernel_xiaomi_pipa [Xiaomi Pad 6 kernel] - https://github.com/utziacre/android_kernel_oneplus_sm8250 [OnePlus 8/8T/8Pro/(9R?) kernel] > Android Root - https://github.com/topjohnwu/Magisk - https://github.com/tiann/KernelSU - https://github.com/riarumoda/KernelSU-4.4 [Adapted for Linux Kernel 4.4 + Google GCC 4.9] - https://github.com/bmax121/APatch - https://github.com/abcz316/SKRoot-linuxKernelRoot - https://github.com/0x36/Pixel_GPU_Exploit > Android Kernel driver development - https://github.com/gmh5225/AndroidDriveSignity [Bypass driver signature verification in Android kernel(ARMv8.3)] - https://github.com/gmh5225/android-kernel-driver-template [A GKI Android kernel driver(AArch64) template] - https://github.com/dabao1955/kernel_build_action [a action to build kernel automatically] > Android Kernel Explorer - https://docs.kernel.org [Linux Kernel documentation] - https://armv8-ref.codingbelief.com/en [ARM Architecture Reference Manual for ARMv8-A] - https://github.com/yhnu/op7t [DIY Kernel] - https://github.com/yabinc/simpleperf_demo [Perf] - https://github.com/gmh5225/android_ebpf [EBPF] - https://github.com/PShocker/Android_bpf_sys [EBPF] - https://github.com/SeeFlowerX/stackplz [EBPF] - https://github.com/cloudfuzz/android-kernel-exploitation [Android Kernel Exploitation] - https://github.com/Snoopy-Sec/Localroot-ALL-CVE [Root CVE] - https://github.com/xmmword/dpatch [Syscall Dispatcher Patching PoC] > Android Kernel Driver - https://github.com/rogxo/kernel_hack - https://github.com/Jiang-Night/Kernel_driver_hack - https://github.com/WeiJiLab/kernel-hook-framework [Kernel inline hook framework] > Android Network Explorer - https://github.com/emanuele-f/PCAPdroid > Android memory loading - https://github.com/icculus/mojoelf - https://github.com/lockedbyte/so_loader > IOS jailbreak - https://github.com/KpwnZ/Def1nit3lyN0tAJa1lbr3akTool [iOS 15.7 and iOS 16.5] - https://github.com/jjolano/shadow - https://github.com/gmh5225/IOS-jailbreak--Fugu15 - https://github.com/Kc57/iHide - https://github.com/palera1n/palera1n - https://github.com/checkra1n - https://github.com/opa334/TrollStore [jailed app] - https://github.com/paradiseduo/IPAPatch [Patch iOS Apps without Jailbreak] > IOS Memory Explorer - https://github.com/hackcatml/kfd-explorer [iOS kernel memory explorer] > Virtual Environments - https://github.com/FBlackBox/BlackBox [Android] - https://github.com/mandiant/flare-vm - https://github.com/hzqst/VmwareHardenedLoader - https://github.com/d4rksystem/VMwareCloak - https://github.com/utmapp/UTM [Run virtual machines on iOS] > Decompiler - IDA Pro - Binary Ninja - https://github.com/NationalSecurityAgency/ghidra - https://github.com/avast/retdec - https://github.com/Col-E/Recaf [Java] - https://github.com/Konloch/bytecode-viewer [Java] - https://github.com/java-deobfuscator/deobfuscator [Java] - https://github.com/angr/binsync [Sync] - https://github.com/crytic/ethersplay [EVM dissassembler] > IDA themes - https://github.com/pr701/dp701 [Dark theme for IDA Pro] - https://github.com/seanwupi/ida-dark-plus [Dark+ Theme] - https://github.com/ioncodes/long_night - https://github.com/can1357/IdaThemer > IDA Plugins - https://github.com/vmallet/ida-plugins [List of IDA Plugins] - https://github.com/onethawt/idaplugins-list [List of IDA Plugins] - https://github.com/NyaMisty/idasdk-collection/tree/master [IDA SDK] - https://github.com/zyantific/IDASkins [Skins] - https://github.com/endofunky/ida-nord-theme [Skins] - https://github.com/giladreich/ida_migrator [Migrate Database] - https://github.com/can1357/NtRays [Windows Kernel Enhance] - https://github.com/JustasMasiulis/ida_bitfields [Windows Kernel Enhance] - https://github.com/VoidSec/DriverBuddyReloaded [Windows Kernel Analysis] - https://github.com/jhftss/IDA2Obj [COFF Relink] - https://github.com/synacktiv/dotNIET [Import .NET Symbol] - https://github.com/aliyunav/Finger [Recognizing Function By Cloud] - https://github.com/FelixBer/FindFunc [Recognizing Function By Pattern] - https://github.com/kweatherman/sigmakerex [Signature Maker] - https://github.com/A200K/IDA-Pro-SigMaker [Signature Maker] - https://github.com/mahmoudimus/ida-pysigmaker [Signature Maker] - https://github.com/TKazer/IDA-Pro-9.0-SigMaker [Signature maker plugin for IDA 9.0] - https://github.com/Mixaill/FakePDB [PDB Generation From IDA] - https://github.com/illera88/Ponce [Symbolic Execution] - https://github.com/airbus-cert/ttddbg [Time Travel Debugging] - https://github.com/P4nda0s/LazyIDA [LazyIDA] - https://github.com/quarkslab/qsynthesis [Greybox Synthesizer geared for deobfuscation of assembly instructions] - https://github.com/medigateio/ida_medigate [RTTI] - https://github.com/OALabs/findyara-ida [Yara] - https://github.com/therealdreg/ida_vmware_windows_gdb [IDA+VMWARE+GDB] - https://github.com/therealdreg/ida_bochs_windows [IDA+BOCHS] - [An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts](https://github.com/ioncodes/idacode) - https://github.com/binarly-io/efiXplorer [UEFI firmware] - https://github.com/Accenture/protobuf-finder [Protobuf] - https://github.com/strazzere/golang_loader_assist [GO Reversed] - https://github.com/GregoryMorse/GhidraDec [Ghidra Decompiler] - https://github.com/AntoineBlaud/EasyRe [Trace Execution] - https://github.com/flatz/ida_ps5_elf_plugin [PS5 elf loader] - https://github.com/gaasedelen/tenet [Execution Traces] - https://github.com/synacktiv/frinet [Frida-based tracer] - https://github.com/polymorf/findcrypt-yara [Find crypto constants] - https://github.com/anatolikalysch/VMAttack [VMAttack PlugIn for IDA Pro] - https://github.com/cseagle/sk3wldbg [Unicorn] - https://github.com/RicBent/Classy [Manage classes] - https://github.com/archercreat/ida_names [Renames pseudocode windows with the current function name] - https://github.com/helpsystems/turbodiff [diff] - https://github.com/joxeankoret/diaphora [diff] - [An IDAPython module for way more convienent way to Reverse Engineering iOS kernelcaches](https://github.com/cellebrite-labs/ida_kcpp) - https://gitlab.com/eshard/d810 [Deobfuscate code at decompilation time by modifying IDA Pro microcode] - https://github.com/CKCat/d810 [Deobfuscate code at decompilation time by modifying IDA Pro microcode] - https://github.com/airbus-seclab/AutoResolv [Resolves functions imported from external libraries] - https://github.com/snare/ida-efiutils [EFI binaries] - https://github.com/JusticeRage/Gepetto [ChatGPT] - https://github.com/MayerDaniel/ida_gpt [ChatGPT] - https://github.com/mahaloz/DAILA [ChatGPT] - https://github.com/ke0z/VulChatGPT [ChatGPT] - https://github.com/WPeace-HcH/WPeChatGPT [ChatGPT] - https://github.com/lzyddf/IDA_Plugin_PCodeGPT [ChatGPT] - https://github.com/deadeert/EWS [Emulation] - https://github.com/patois/genmc [Display Hex-Rays Microcode] - https://github.com/RolfRolles/HexRaysDeob [Hex-Rays Microcode] - https://github.com/HexRaysSA/goomba [Simplify MBA] - https://github.com/es3n1n/ida-wakatime-py [WakaTime integration for IDA Pro] - https://github.com/senator715/IDA-Fusion [Fast Signature scanner & creator] - https://github.com/cellebrite-labs/PPLorer [Resolves PPL calls to the actual underlying PPL function] - https://github.com/kweatherman/ida_missinglink [Fills in missing indirect CALL & JMP target information] - https://github.com/yubie-re/ida-jm-xorstr-decrypt-plugin [Attempts to decrypt JM Xorstr in some x64 binaries] - https://github.com/timetravelthree/IDARustDemangler [Rust Demangler & Normalizer] - https://github.com/gmh5225/ida-find-.data-ptr [.data ptr lookup script] - https://github.com/repnz/ida-plugins [Register Cross References] - https://github.com/lstaroth/AntiXorstr [Anti Xorstr] - https://github.com/SentineLabs/AlphaGolang [Analyzing Golang Binaries] - https://github.com/tmr232/Sark [IDAPython Made Easy] - https://github.com/govcert-ch/ConfuserEx_IDAPython [Deobfuscation script for ConfuserEx] - https://github.com/sonyps5201314/pdb [PDB plugin with enhance and bugfix] - https://github.com/Coldzer0/IDA-For-Delphi [IDA-For-Delphi] - https://github.com/AntonKukoba1/BetterCallStack [Improve call stack] - https://github.com/za233/IDADeflat [deflat] - https://github.com/RomanRybachek/Copy_RVA [Copy RVA] - https://github.com/RevEngAI/reai-ida [RevEng.AI] - https://github.com/gaasedelen/microavx [AVX Lifter] - https://github.com/thalium/ida_kmdf [IDA kmdf] - https://github.com/zengfr/XrefsExt [XrefsExt plugin] - https://github.com/sterrasec/genpatch [Python script for patching binary] - https://github.com/AzzOnFire/yarka [YARA signature creation] - https://github.com/VirusTotal/vt-ida-plugin [VirusTotal plugin] - https://github.com/crifan/AutoRename [Auto rename symbol] - https://github.com/LAC-Japan/IDA_Plugin_AntiDebugSeeker [Extract anti-debugging] - https://github.com/cseagle/blc [Integrate Ghidra's decompiler] - https://github.com/Goatman13/ps2_ida_vu_micro [Find and disassembly vu microcode in ps2 executables] - https://github.com/arizvisa/ida-minsc [Functional DWIM interface] - https://github.com/wINfOG/IDA_Easy_Life [Deobfuscation] - https://github.com/senko37/yarascan-ida [Scan file with Yara rules] - https://github.com/SamuelTulach/ida-unity-pdb-downloader [Unity PDB Downloader] - https://github.com/TrungNguyen1909/aarch64-sysreg-ida [A IDA plugin to show ARM MSRs nicely] - https://github.com/danielplohmann/gui-plugin-template [A template for cross-compatible GUI plugins] - https://github.com/gmh5225/IDA-MapSymbolParser [IDA Map File Symbol Renamer] - https://github.com/gmh5225/IDA-KallsymsSymbolRenamer [IDA kallsyms Renamer] - https://github.com/XMCVE/import-kallsyms [IDA Pro Plugin to import /proc/kallsyms for Linux Kernel] - https://github.com/tomrus88/OpenLumina [Allows connecting to third party Lumina servers] - https://github.com/stuxnet147/IDA-Assistant [Claude-3 models assistant] - https://github.com/goseungduk/CE_Tracer-IDA [CheatEngine Value Tracer of IDA] - https://github.com/binarly-io/idapcode [Displaying the P-Code for the current function] - https://github.com/ElvisBlue/emotet-deobfuscator [IDA plugin to deobfuscate emotet CFF] - https://github.com/threatlabz/pikabot-deobfuscator [Deobfuscating Pikabot's strings using RC4 and AES] - https://github.com/Pycatchown/ClassMaker [IDA plugin to make classes automatically] - https://github.com/airbus-cert/comida [An IDA Plugin that help analyzing module that use COM] - https://github.com/Sandspeare/ida2llvm [Lifting IDA Microcode into LLVM IR] - https://github.com/crtdll/ida-gameguard-str-dec [GameGuard String Decryption] - https://github.com/kkent030315/IDARustCargo [Displaying potentially installed Cargo dependencies] - https://github.com/dNop90/dOffset [IDA Pro and Cheat Engine to get the offset of the current module] - https://github.com/sneakyevil/ida_functioncolor [IDA Plugin to colorize function definition in pseudocode] - https://github.com/apkunpacker/IDA-Gepetto [IDA plugin which queries Local language models] - https://github.com/Jackiemin233/Gemini-Genius [IDA python 3 plugin and binary file similarity comparison] - https://github.com/lj94093/IDAAndroidBreakpoint [IDA plugin aid to set android so breakpoint] - https://github.com/jonpalmisc/ida_screenshot [High-resolution screenshot capture plugin for IDA Pro] - https://github.com/JANlittle/IDARustHelper [Small rust binary analysis helper for IDA] - https://github.com/mefistotelis/ida-pro-loadmap [Plugin for IDA Pro disassembler which allows loading .map files] - https://github.com/OALabs/hashdb-ida [HashDB API hash lookup plugin for IDA Pro] - https://github.com/Vu1nT0tal/firmeye [IoT] - https://github.com/sean2077/big5-decode-ida [IDA Plugin for decoding bytes as big5] - https://github.com/Vis-Wing/Binoculars [Binoculars is an IDA PRO plugin with an integrated AI interface] - https://github.com/Reodus/CBS [IDA Plugin to set custom breakpoints on mnemonics] - https://github.com/matteyeux/IDArling [IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays] - https://github.com/richor1042/IDAFuncOutline [optimize the readability of decompiled code for iOS ARM64 binaries] > IDA Signature Database - https://github.com/push0ebp/sig-database > Binary Ninja Plugins - https://github.com/Vector35/official-plugins - https://github.com/Vector35/community-plugins - https://github.com/FuzzySecurity/BinaryNinja-Themes [Theme] - https://github.com/EliseZeroTwo/SEH-Helper [SEH Helper] - https://github.com/Vector35/tanto [Slices Functions] - https://github.com/ergrelet/triton-bn [Triton] - https://github.com/google/binexport [BinDiff] - https://github.com/Pusty/BinaryNinjaPlugins - https://github.com/borzacchiello/seninja [Symbolic Execution] - https://github.com/yellowbyte/opaque-predicates-detective - https://github.com/ex0dus-0x/fuzzable [Fuzzer] - https://github.com/jmprdi/binja-division-deoptimization [Division and Modulo Deoptimizer] - https://github.com/Vector35/OpaquePredicatePatcher [Opaque Predicate Patcher] - https://github.com/jmprdi/binja-division-deoptimization [Division and Modulo Deoptimizer] - https://github.com/mrphrazer/obfuscation_detection [Collection of scripts to pinpoint obfuscated code] - [Package Binary Code as a Python class using Binary Ninja and Unicorn Engine](https://github.com/pbiernat/ripr) - https://github.com/seeinglogic/ariadne [Graph Analysis] - https://github.com/skr0x1c0/binja_kc [Plugin for loading MachO kernelcache and dSYM files] - https://github.com/Vector35/workflow_objc [Objective-C] - https://github.com/apekros/binja_sigmaker [Create and find signatures] - https://github.com/dayzerosec/AMD-SP-Loader [AMD-SP or PSP firmware] - https://github.com/WhatTheFuzz/binaryninja-openai [Integrates OpenAI] - https://github.com/dzervas/frinja [Frida plugin for Binary Ninja] - https://github.com/danielplohmann/gui-plugin-template [A template for cross-compatible GUI plugins] - https://github.com/ergrelet/themida-spotter-bn [Detect Themida/WinLicense and Code Virtualizer's obfuscated code locations] - https://github.com/ahaggard2013/binaryninja-ollama [Binary Ninja Ollama] - https://github.com/0xricksanchez/Shellcoder [BinaryNinja Shellcoder Plugin] > Ghidra Plugins - https://github.com/AllsafeCyberSecurity/awesome-ghidra [List] - https://github.com/CENSUS/ghidra-frida-hook-gen - https://github.com/Gekkio/GhidraBoy [Sharp SM83 / Game Boy extension for Ghidra] - https://github.com/fmagin/ghidra-openai [ChatGPT] - https://github.com/securityjoes/ThreatResearch [ChatGPT] - https://github.com/evyatar9/GptHidra [ChatGPT] - https://github.com/moyix/gpt-wpre [ChatGPT] - https://github.com/pudii/gba-ghidra-loader [GameBoy] - https://github.com/MEhrn00/Ghidra_COFFParser [COFF] - https://github.com/ghidragolf/ghidra_scripts [Scripts] - https://github.com/PAGalaxyLab/ghidra_scripts [Scripts] - https://github.com/danbrodsky/GFred [Command Palette] - https://github.com/Nalen98/AngryGhidra [Use angr in Ghidra] - https://github.com/justfoxing/ghidra_bridge [Python 3 bridge to Ghidra's Python scripting] - https://github.com/astrelsky/GhidraOrbis [Orbis OS specific software and file formats] - https://github.com/astrelsky/Ghidra-Cpp-Class-Analyzer [C++ Class and Run Time Type Information Analyzer] - https://github.com/DMaroo/GhidRust [Rust decompiler] - https://github.com/Comsecuris/gdbghidra [GDB session] - https://github.com/hyuunnn/Hyara [Yara] - https://github.com/Deatty/Ghidra-Obfuscation-Detection [Detect obfuscated/complex code] - https://github.com/advanced-threat-research/GhidraScripts [Some scripts] - https://github.com/fuzzypickles14/BetterStringAnalyzer [A better string analyzer for Ghidra] - https://github.com/clearbluejar/ghidriff [Python Command-Line Ghidra Binary Diffing Engine] - https://github.com/Katharsas/ghidra-struct-importer [Struct Importer] - https://github.com/danielplohmann/gui-plugin-template [A template for cross-compatible GUI plugins] - https://github.com/astrelsky/GhidraGradlePlugin [Gradle] > Windbg Plugins - https://github.com/comaeio/SwishDbgExt - https://github.com/lowleveldesign/comon [Trace COM] - https://github.com/bruce30262/TWindbg [PEDA-like debugger UI for WinDbg] - https://github.com/JKornev/cfgdump [Analyze Control Flow Guard map] - https://github.com/yardenshafir/WinDbg_Scripts [WinDbg scripts] - https://github.com/long123king/dk [Refactored version of tokenext] - https://github.com/ch3rn0byl/WinDbg-Extensions [Callback Extension] - https://github.com/KasperskyLab/WinDbg-JS-Scripts [JS Scripts] - https://github.com/DumpAnalysis/WinDbg_Copilot [WinDbg Copilot] > X64DBG Plugins - https://github.com/x64dbg/x64dbg/wiki/Plugins - https://github.com/horsicq/x64dbg-Plugin-Manager - https://github.com/m417z/Multiline-Ultimate-Assembler - https://github.com/x64dbg/Classroom - https://github.com/VenTaz/Themidie - https://github.com/Ahmadmansoor/x64dbgScript - https://github.com/push0ebp/xMalHunter [Detect malicious materials] - https://github.com/morsisko/xFindOut - https://github.com/jdavidberger/chaiScriptPlugin - https://github.com/gmh5225/X64DBG-ViewDllNotification - https://github.com/legendabrn/AutoAttach - https://github.com/secrary/idenLib [Generate signatures] - https://github.com/GregoryMorse/GhidraDec [Ghidra Decompiler] - https://github.com/x64dbg/x64dbgbinja [Binary Ninja] - https://github.com/DNLINYJ/Anti_miHoYo_Jcc_Obfuscate - https://github.com/mrexodia/DisableParallelLoader [Disable parallel loading of dependencies] - https://github.com/ElvisBlue/x64dbgpython [Running python3 script] - https://github.com/secrary/idenLibX [Library Function Identification] - https://github.com/x64dbg/SlothBP [Collaborative Breakpoint Manager] - https://github.com/Kwansy98/ApiBreakpoint [Api Breakpoint] - https://github.com/0ffffffffh/yummyPaste [paste string formatted byte data block into x64dbg easy] - https://github.com/horsicq/x64dbg-Plugin-Manager [Plugin manager for x64dbg] - https://github.com/ZehMatt/x64dbgPlaytime [Lua script] - https://github.com/milcert/ExpoMon [Exports monitoring] - https://github.com/m417z/x64dbg-xfg-marker [Marks XFG call signatures as data] - https://github.com/Kwansy98/x64dbgCallFinder [Call Finder] - https://github.com/gmh5225/X64DBG-MapLdr [Loads the map file generated by IDA Pro] - https://github.com/mibho/x64dbgTraceReader [Trace Reader] > Cheat Engine Plugins - https://github.com/FreeER/CE-Extensions [Lua Extensions] - https://github.com/Skyrimfus/CE-lua-extensions [Lua Extensions] - https://github.com/bbfox0703/Mydev-Cheat-Engine-Tables [CT] - https://github.com/inuNorii/Elden-Ring-CT-TGA [Elden Ring] - https://github.com/gmh5225/CE-remap-plugin [Remap] - https://github.com/gmh5225/overwatch-iat-fixer [Overwatch IAT Fixer] - https://github.com/FreeER/CE-Examples [Some Examples] - [Porting ce's monodatacollector to android/ios](https://github.com/gmh5225/frida-il2cpp-datacollector) - https://github.com/DoranekoSystems/wasm-ceserver [Analyzing WebAssembly] > Injection:Windows - https://github.com/btbd/smap [Scatter Manual Map] - https://github.com/btbd/modmap [Extend Manual Map] - https://github.com/KGB-1337/memmap [Extend Manual Map] - https://github.com/weak1337/ModExMap [Extend Manual Map] - https://github.com/mactec0/Kernelmode-manual-mapping-through-IAT [IAT Manual Map] - https://github.com/charliewolfe/Stealthy-Kernelmode-Injector [PTE/VAD Manipulation Manual Map] - https://github.com/wbenny/injdrv [APC] - https://github.com/alexkrnl/Kernel-dll-injector [APC] - https://github.com/w1u0u1/kinject [Map + APC] - https://github.com/1401199262/RemoteCall [APC Remote Call] - https://github.com/TheCruZ/Simple-Manual-Map-Injector [Manual Map] - https://github.com/andrew9382/manual_mapping_dll_injector [Manual Map] - https://github.com/danielkrupinski/MemJect [Manual Map] - https://github.com/can1357/ThePerfectInjector [PTE.User] - https://github.com/dumbasPL/fumo_loader [PTE.User] - https://github.com/estimated1337/executor [PTE.User] - https://github.com/Nou4r/PresentInjector [PTE.User] - https://github.com/JGonz1337/kernel-eac-be-injector [PTE.User] - https://github.com/Cr4sh/KernelForge [Hijack ROP] - https://github.com/Compiled-Code/be-injector [Attack COW] - https://github.com/ergrelet/dll-hot-reload [Hot Reload] - https://github.com/ExpLife0011/KeUserModeCallBack [KeUserModeCallBack] - [KeUserModeCallBack Win10](https://github.com/Splitx12/eft/blob/834064aacaab7353173e36acc15933a3cf9289b3/eft/usercallback.h#L50) - https://github.com/YouNeverKnow00/Kernelmode-DLL-Injector [Manual Map] - [windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking](https://github.com/sum-catnip/kptnhook) - https://github.com/Broihon/GH-Injector-Library [inject library and tool] - https://github.com/5paceman/nightshade [inject tool] - https://github.com/deepinstinct/Dirty-Vanity [RtlCreateProcessReflection] - https://github.com/LloydLabs/ntqueueapcthreadex-ntdll-gadget-injection [NtQueueApcThreadEx + gadget] - https://github.com/3xpl01tc0d3r/ProcessInjection [Various process injection techniques] - https://github.com/zorftw/lsass-extend-mapper [Manual mapper from LSASS] - https://github.com/zorftw/revert-mapper [Map x64 DLLs in WoW64] - https://github.com/SDXT/MMInject [Using NX Bit Swapping and VAD hide] - https://github.com/Fahersto/code_injection [Several code injection techniques] - https://github.com/KameronHawk/Kernel-VAD-Injector [Hide VAD] - https://github.com/nettitude/Tartarus-TpAllocInject [TpAllocInject] - https://github.com/SafeBreach-Labs/PoolParty [ThreadPool] - https://github.com/hasherezade/thread_namecalling [SetThreadDescription] > Injection:Linux - https://github.com/ixty/mandibule > Injection:Android - https://github.com/gmh5225/Android-ModGamesByInjectZygote - https://github.com/gmh5225/Android-DLL-Injector - https://github.com/reveny/Android-Ptrace-Injector - https://github.com/reveny/Android-LD-Preload-Injector - https://github.com/ohchase/yaui - https://github.com/cs1ime/AndroidSuperInject [Injecting into SELinux-protected system service processes] - https://github.com/erfur/linjector-rs [Code injection on Android without ptrace] - https://github.com/NepMods/InjectARM64 [Non-root injection] > DLL Hijack - https://github.com/Sh0ckFR/DLLirant [Hijacking researches] - https://github.com/redteamsocietegenerale/DLLirant [Hijacking researches Tool] - https://github.com/knight0x07/ImpulsiveDLLHijack [Hijacking researches] - https://github.com/wietze/HijackLibs [Project for tracking publicly disclosed DLL Hijacking opportunities] - https://github.com/gmh5225/DLL-Hijack-ExportDumper [Dump the export table of PE files] - https://github.com/cyberark/DLLSpy [DLL Hijacking Detection Tool] - [Project for identifying executables and DLLs vulnerable to relative path DLL hijacking](https://github.com/wietze/windows-dll-hijacking) - https://github.com/anhkgg/SuperDllHijack [A general DLL hijack technology] - https://github.com/ctxis/DLLHSC [DLL Hijack SCanner] > Hook - https://github.com/stars/gmh5225/lists/hook [Lists] - https://github.com/microsoft/Detours - https://github.com/wbenny/DetoursNT - https://github.com/stevemk14ebr/PolyHook - https://github.com/stevemk14ebr/PolyHook_2_0 - https://github.com/WopsS/RenHook - https://github.com/bmax121/KernelPatch [Hooking the Linux kernel] - https://github.com/Zeex/subhook - https://github.com/axhlzy/PyAsmPatch - https://github.com/gmh5225/Driver-KDtour [Easy Kernel Detour] - https://github.com/nelfo/PGHooker [Page Guard] - https://github.com/weak1337/SkipHook [Skip Hook] - https://github.com/0mdi/edgegdi_hook [gdi32 .data swap] - https://github.com/noobpk/frida-android-hook [frida hook for android] - https://github.com/SamuelTulach/LightHook [cross-platform hook library] - https://github.com/3intermute/arm64_silent_syscall_hook [ARM64 Patching exception handler] - https://github.com/kubo/plthook [PLT(Procedure Linkage Table) hook] - https://github.com/WeiJiLab/kernel-hook-framework [linux kernel inline hook framework] - https://github.com/Rprop/And64InlineHook [Android ARMv8 inline hook framework] - https://github.com/GToad/Android_Inline_Hook_ARM64 [Android ARMv8 inline hook framework] - https://github.com/BossKoopa/BWSR [Arm64 inline hooking for iOS, Android, OSX, and Linux] - https://github.com/regomne/ilhook-rs [Rust x86] > ROP Finder - https://github.com/0vercl0k/rp - https://github.com/JonathanSalwan/ROPgadget - https://github.com/helpsystems/Agafi - https://github.com/hugsy/ropgadget-rs > ROP Generation - https://github.com/d4em0n/exrop > Anti Signature Scanning - https://github.com/scrt/avdebugger > RPM - https://github.com/btbd/access - https://github.com/crvvdev/intraceptor [access] - https://github.com/juniorjacob/readwrite-kernel-stable - https://github.com/DarthTon/Blackbone - https://github.com/HoShiMin/Kernel-Bridge - https://github.com/waryas/EUPMAccess - https://github.com/waryas/UMPMLib - https://github.com/EBalloon/Remap [Clone process] - https://github.com/TheCruZ/EFI_Driver_Access [EFI RPM] - https://github.com/SamuelTulach/efi-memory [EFI RPM] - https://github.com/ekknod/SubGetVariable [EFI RPM] - https://www.unknowncheats.me/forum/anti-cheat-bypass/489305-read-write-process-attach.html - https://www.unknowncheats.me/forum/anti-cheat-bypass/444289-read-process-physical-memory-attach.html - https://github.com/gamozolabs/mempeek [Linux] - https://github.com/SamuelTulach/meme-rw [kdmapper] - https://github.com/gmh5225/Driver-RPM-DirectPageManipulation [read physical memory] - https://github.com/btbd/ddma [Disk based DMA for ATA and SCSI] - https://github.com/gmh5225/DDMA-1 [Disk based DMA for ATA and SCSI] - https://github.com/ekknod/vm [Minimal memory library for Windows/Linux] - https://github.com/ALittlePatate/TaxiDriver [W/RPM Driver and usermode for Linux] - https://github.com/gmh5225/Android-MemoryTool [RPM for Android] - https://github.com/Anonym0usWork1221/C-Android-Memory-Tool [RPM for Android] > DMA - https://github.com/ufrisk/pcileech - https://github.com/ekknod/pcileech-wifi [pcileech-fpga with wireless card emulation] - https://github.com/Cr4sh/pico_dma - https://github.com/Spuckwaffel/DMALib [DMA library] - https://github.com/Metick/DMALibrary [DMA library] - https://github.com/ekknod/vm [Minimal memory library for Windows/Linux] - https://github.com/imerzan/ReClass-DMA [ReClass DMA] - https://github.com/Metick/CheatEngine-DMA [CheatEngine DMA] > W2S - https://github.com/DrNseven/D3D11-Worldtoscreen-Finder > Overlay - https://github.com/coltonon/D2DOverlay - https://github.com/SurgeGotTappedAgain/Window-Hijack - https://github.com/SeanPesce/Direct3D9-Overlay [DX9] - https://github.com/Unkn0wnH4ck3r/GameOverlayUIHook [Steam] - https://github.com/gmh5225/Steam-Hook-Render-PoC [Steam] - https://github.com/xo1337/steam-overlay-x64 [Steam] - https://github.com/Splitx12/StrongSteam [GDI + Steam] - https://github.com/gmh5225/dwmhook [DWM] - https://github.com/LoxTus/dwm-overlay [DWM] - https://github.com/rlybasic/DWM_Hook [DWM] - https://github.com/mfxiaosheng/dwmhook [DWM VFTable] - https://github.com/iraizo/nvidia-overlay-hijack [Hijack Nvidia] - https://github.com/Brattlof/D3DOverlay-Nvidia-Hijack [Hijack Nvidia] - https://github.com/gmh5225/NVIDIA-OVERLAY [Hijack Nvidia] - https://github.com/Calvin-LLC/nvidia-overlay-hijack [Hijack Nvidia] - https://github.com/es3n1n/nvidia-overlay-renderer [Nvidia] - https://github.com/muturikaranja/overlay [SetWindowsHookEx] - https://github.com/gmh5225/OBS-graphics-hook32-Hook [OBS Hook] - https://github.com/plu1337/OBS-Hook [OBS Hook] - https://github.com/PierreCiholas/NotAnOverlay [Duplicating with GDI] - https://github.com/SsageParuders/Android_Native_Surface [Android Native Overlay] - https://github.com/fgsqme/Android_Native_Surface [Android Native Overlay] - https://github.com/xBrunoMedeiros/eac-overlay [EAC Overlay] - https://github.com/3r4y/imgui-external-overlay [imgui overlay] - https://github.com/J0xna/Kernel-Overlay-Hider [Kernel Overlay Hider] - https://github.com/geeksonsecurity/android-overlay-malware-example [Android] - https://github.com/SamuelTulach/OverlayCord [Discord] > Render/Draw - https://github.com/vmcall/dxgkrnl_hook - https://github.com/thesecretclub/window_hijack [Hijacking thread contexts] - https://github.com/r1cky33/krnl-gdi-render [Dxgkrnl + GDI] - https://github.com/BadPlayer555/KernelGDIDraw [Kernel + GDI] - https://github.com/NSG650/NtDOOM [Kernel + GDI] - https://github.com/Splitx12/StrongSteam [GDI + Steam] - https://github.com/Sentient111/KernelDrawing [Drawing from kernelmode without any hooks] - https://github.com/wbaby/DoubleCallBack [DWM In Kernel] - https://github.com/cs1ime/KernelDwm [DWM In Kernel] - https://github.com/gmh5225/DWM-DwmDraw [DWM StackWalk] - https://github.com/Polarmods/PolarImGui [Imgui On Android] - https://github.com/vrolife/android_native_app_imgui [Imgui On Android] - https://github.com/LGLTeam/Android-Mod-Menu [Floating mod menu for Android] - https://github.com/springmusk026/ImGui-Unity-With-Layout [Imgui For Unity] - https://github.com/springmusk026/Imgui-Unity [Imgui For Unity] - https://github.com/gmh5225/Android-Mod-Menu-ImGui [Imgui For Unity] - https://github.com/Octowolve/Unity-ImGUI-Android [Imgui For Unity] - https://github.com/lbertitoyt/ImGUI-Zygisk-Unity [Imgui For Unity] - https://github.com/gmh5225/zygisk-imgui-modmenu [ImGui with Zygisk] - https://github.com/gmh5225/ImGui-Unity-Android [Imgui For Unity] - https://github.com/gmh5225/BepInEx-IL2CPPBase [IL2CPP Menu] - https://github.com/springmusk026/Android-Mod-Menu-Kotlin [IL2CPP Menu] - https://github.com/gmh5225/Android-OpenGL-ES-Chams [Chams] - https://github.com/RequestFX/ImGUI-Advanced-Cheat-Menu [Imgui Menu] - https://github.com/gmh5225/External-imgui-Cheat-Menu-Example-2023 [External Imgui Menu] - https://github.com/gmh5225/External-ImGui-Android [External Imgui Menu for Android] - https://github.com/xProHackerx/imgui-ios-mod-menu [Imgui Menu for IOS] - https://github.com/sy1ntexx/egui-d3d11 [Menu] - https://github.com/springmusk026/Android-ModMenu-SemiJni [Menu for imgui] - https://github.com/fedes1to/Zygisk-ImGui-Menu [ImGui menu using Zygisk] - https://github.com/reveny/Zygisk-ImGui-Mod-Menu [ImGui menu using Zygisk] - https://github.com/s4m33r89/Imgui-Native-ModMenu [Imgui Menu for Android] > UI Interface - https://github.com/adamhlt/ImGui-Standalone > Vulnerable Driver - https://www.loldrivers.io/drivers - https://github.com/magicsword-io/LOLDrivers - https://github.com/rtfmkiesel/loldrivers-client [Scan loldrivers] - https://github.com/FourCoreLabs/LolDriverScan [Scan loldrivers] - https://github.com/trailofbits/HVCI-loldrivers-check [HVCI loldrivers check] - https://github.com/hacksysteam/HackSysExtremeVulnerableDriver [Guide] - https://github.com/xct/windows-kernel-exploits [Guide] - https://github.com/namazso/physmem_drivers [Vulnerable Driver List] - https://github.com/alfarom256/drivers_and_shit [Vulnerable Driver List] - https://github.com/NullArray/WinKernel-Resources/tree/main/Drivers [Vulnerable Driver List] - https://github.com/CaledoniaProject/drivers-binaries [Vulnerable Driver List] - https://github.com/Xxmmy/vulnerable-driver-scanner [Scans for vulnerable drivers] - https://github.com/Sentient111/VulnerableDriverScanner [Scans for vulnerable drivers] - https://github.com/shareef12/cpuz [CPU-Z] - https://github.com/SamLarenN/CPUZ-DSEFix [CPU-Z] - https://github.com/gmh5225/gdrv-loader/tree/1909_mitigation [gdrv.sys] - https://github.com/backengineering/VDM [gdrv enhance] - https://github.com/Compiled-Code/eac-mapper [gdrv.sys] - https://github.com/gmh5225/CVE-2018-19320-LPE [gdrv.sys] - https://github.com/gmh5225/CVE-2018-19320 [gdrv.sys] - https://github.com/gmh5225/gdriver-lib [gdrv.sys] - https://github.com/holi4m/gdrv-loader-v2 [gdrv.sys] - https://github.com/gmh5225/KDP-compatible-driver-loader [gdrv.sys] - https://github.com/1337kenzo/gdrv-loader-updated [gdrv.sys Win11] - https://github.com/eddeeh/kdmapper [iqvw64e.sys] - https://github.com/TheCruZ/kdmapper [iqvw64e.sys] - https://github.com/Brattlof/kdmapper-1909 [iqvw64e.sys] - https://github.com/paysonism/saturn-mapper [iqvw64e.sys] - https://github.com/rmccrystal/kdmapper-rs [A kdmapper library for Rust] - https://github.com/kkent030315/MsIoExploit [MsIo64.sys] - https://github.com/gmh5225/VulnerableKernel_Driver [MsIo64.sys] - https://github.com/kkent030315/evil-mhyprot-cli [Mhyprot2.sys] - https://github.com/leeza007/evil-mhyprot-cli [Mhyprot2.sys] - https://github.com/zer0condition/mhydeath [Mhyprot2.sys] - https://github.com/keowu/mhyprot2 [Mhyprot2.sys] - https://github.com/kagurazakasanae/Mhyprot2DrvControl [Mhyprot2.sys] - https://github.com/gmh5225/CVE-2020-36603 [Mhyprot2.sys] - https://github.com/tanduRE/AvastHV [Avast] - https://github.com/iPower/KasperskyHook [Kaspersky] - https://github.com/SamuelTulach/EvilKaspersky [Kaspersky] - https://github.com/mathisvickie/CVE-2021-21551 [dbutil_2_3.sys] - https://github.com/ch3rn0byl/CVE-2021-21551 [dbutil_2_3.sys] - https://github.com/SpikySabra/Kernel-Cactus [dbutil_2_3.sys] - https://github.com/mzakocs/CVE-2021-21551-POC [dbutil_2_3.sys] - https://github.com/Flerov/TS-Fucker [dbutil_2_3.sys] - https://github.com/Splitx12/imxyviMapper [AsUpIO.sys] - https://github.com/archercreat/vdk [Speedfan.sys] - https://github.com/SamLarenN/SpeedFan-Exploit [Speedfan.sys] - https://github.com/Gbps/CapcomLib [Capcom.sys] - https://github.com/es3n1n/dolboeb-executor [Capcom.sys] - https://github.com/SamLarenN/CapcomDKOM [Capcom.sys] - https://github.com/Exploitables/CVE-2015-2291 [IQVW64.sys] - https://github.com/KiFilterFiberContext/AsIO-Exploit [AsIO3.sys] - https://github.com/IamM47Z/OpenHardwareMonitor-PoC [OpenHardwareMonitorLib.sys] - https://github.com/RedCursorSecurityConsulting/PPLKiller [RTCore64.sys] - https://github.com/Processus-Thief/PsNotifRoutineUnloader [RTCore64.sys] - https://github.com/zeze-zeze/CYBERSEC2023-BYOVD-Demo [RTCore64.sys] - https://github.com/oakboat/RTCore64_Vulnerability [RTCore64.sys] - https://github.com/ReCryptLLC/CVE-2022-42045 [amsdk.sys] - https://github.com/gmh5225/CVE-2022-3699 [LenovoDiagnosticsDriver.sys] - https://github.com/estimated1337/lenovo_mapper [LenovoDiagnosticsDriver.sys] - https://github.com/estimated1337/lenovo_exec [LenovoDiagnosticsDriver.sys] - https://github.com/kkent030315/CVE-2022-42046 [wfshbr64.sys] - https://github.com/tijme/amd-ryzen-master-driver-v17-exploit [AMD's Ryzen Master Driver] - https://github.com/OmriBaso/RToolZ [ProcExp152.sys] - https://github.com/SamuelTulach/nullmap [Afd.sys] - https://github.com/gmh5225/Windows-10-22H2-Vulnerable-driver-communication [asromgdrv.sys] - https://github.com/alfarom256/HPHardwareDiagnostics-PoC [etdsupp.sys] - https://github.com/ZeroMemoryEx/Blackout [gmer64.sys] - https://github.com/ZeroMemoryEx/Terminator [zam64.sys] - https://github.com/gmh5225/zam64-zemina [zam64.sys] - https://github.com/gmh5225/CVE-2017-9769 [rzpnk.sys] - https://github.com/kite03/echoac-poc [echo_driver.sys] - https://github.com/pseuxide/kur [echo_driver.sys] - https://github.com/gmh5225/NVDrv [nvaudio.sys] - https://github.com/gmh5225/UCMapper [nvaudio.sys] - https://github.com/zeze-zeze/HITCON-2023-Demo-CVE-2023-20562 [AMDCpuProfiler.sys] - https://github.com/keowu/BadRentdrv2 [rentdrv2.sys] - https://github.com/gmh5225/S4Mapper [SignalRgbDriver.sys] - https://github.com/gmh5225/dse_hook [winio64.sys] - https://github.com/enkomio/s4killer [probmon.sys] - https://github.com/floesen/KExecDD [KSecDD.sys] - https://github.com/varwara/CVE-2024-26229 [csc.sys] - https://github.com/zer0condition/ZeroHVCI [csc.sys] - https://github.com/gmh5225/Win-Driver-EXP/tree/main/CVE-2024-33218 [AsUpIO64.sys] - https://github.com/gmh5225/Win-Driver-EXP/tree/main/CVE-2024-30804 [AsInsHelp64.sys] - https://github.com/gmh5225/CVE-2020-14974 [IObitUnlocker.sys] - https://github.com/CyberSecurityUP/ProcessKiller-BYOVD [viragt64.sys] > Driver Communication - https://github.com/gmh5225/Driver-Communication-List - https://github.com/gmh5225/ida-find-.data-ptr [.data ptr lookup script] - https://github.com/EBalloon/Common-Registry [Registry Callback] - https://github.com/gmh5225/Common-Registry-Jmp-RCX [Registry Callback] - https://github.com/0xGREG/registry-callbacks [Registry Callback] - https://github.com/adrianyy/rw_socket_driver [Socket] - https://github.com/zoand/BOOM [Hijack Beep.sys] - https://github.com/gmh5225/Driver-read_write [Hijack IRP Beep.sys] - https://github.com/isoadam/gina_public [Hijack IRP Null] - https://github.com/Barracudach/Swap-control-ioctl [Hijack IRP SpeedFan.sys] - https://github.com/adspro15/km-um-communication - https://github.com/Spuckwaffel/Kernel-Thread-Driver [Thread] - https://github.com/Astronaut00/DoubleDataPointer [Double Data Pointer] - https://github.com/btbd/access [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter] - https://github.com/paradoxwastaken/Poseidon [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter] - https://github.com/FarmEquipment69/umap-mapper [NtConvertBetweenAuxiliaryCounterAndPerformanceCounter] - https://github.com/weak1337/EvCommunication [NtTokenManagerCreateFlipObjectReturnTokenHandle] - https://github.com/gmh5225/Driver-kaldereta [NtTokenManagerGetAnalogExclusiveTokenEvent] - https://github.com/UCFoxi/Shared-FlushFileBuffers-Communication [FlushFileBuffers] - https://github.com/gmh5225/UCFoxi-Shared-FlushFileBuffers-Communication-Update FlushFileBuffers] - https://github.com/Sinclairq/DataCommunication [NtCompareSigningLevels] - https://github.com/ExpLife0011/NtCompareSigningLevel-hook [NtCompareSigningLevels] - https://github.com/muturikaranja/AfdIrpCallDispatch [.data Pointer hook in Afd.sys] - https://www.unknowncheats.me/forum/anti-cheat-bypass/483093-vtable-kernel-function-hook-communication.html [NtUserMessageCall] - https://github.com/EBalloon/MapPage [NtUserGetObjectInformation] - https://github.com/Compiled-Code/eac-mapper [NtMapVisualRelativePoints] - https://github.com/gmh5225/eac-bypass-1 [NtMapVisualRelativePoints] - https://git.back.engineering/_xeroxz/NtWin32k [NtUserGetThreadState] - https://github.com/sbsbsbssbsbs/boundcallback [KeRegisterBoundCallback] - https://github.com/Skengdoo/DataPtrSwap-driver [NtSetCompositionSurfaceAnalogExclusive] - https://github.com/xPasters/.data-ptr-swap [NtSetCompositionSurfaceAnalogExclusive] - https://github.com/ryan-weil/ReadWriteDriver [NtUserSetSysColors] - https://github.com/D3DXVECTOR2/NtUserUpdateWindowTrackingInfo [NtUserUpdateWindowTrackingInfo] - https://github.com/KiFilterFiberContext/windows-software-policy [clip] - https://github.com/gmh5225/Interep-Driver-Leak [NtGdiPolyPolyDraw] - https://github.com/gmh5225/Comm-data-ptr-driver [NtGdiPolyPolyDraw] - https://github.com/JGonz1337/kernel-eac-be-comm [NtGdiPolyPolyDraw] - https://github.com/Lynnette177/Rigel-Driver [NtGdiDdDDINetDispGetNextChunkInfo] - https://github.com/NullTerminatorr/NullHook [NtDxgkGetTrackedWorkloadStatistics] - https://github.com/gmh5225/Kernel-Cheat-for-directx3D [NtDxgkGetTrackedWorkloadStatistics] - https://github.com/gmh5225/Comm-Data-Pointer-Swap [NtDCompositionSetChildRootVisual] - https://github.com/gmh5225/Comm-NekoSwap [Win32kApiSetTable] - https://github.com/Deputation/kernel_payload_comms [Shared Memory] - https://github.com/Chase1803/UCMiraka-ValorantExternal [NtUserGetPointerProprietaryId] - https://github.com/gmh5225/Comm-ImMiraclela [NtDxgkGetTrackedWorkloadStatistics/NtDxgkGetAvailableTrackedWorkLoadIndex] - https://www.unknowncheats.me/forum/2976731-post45.html [IsWin32KSyscallFiltered] - https://github.com/J0xna/Kernel-Overlay-Hider [NtMITPostWindowEventMessage] - https://github.com/gmh5225/Eac-Injector-Driver [NtQueryIntervalProfile] - https://github.com/gmh5225/job_communication [NtQueryInformationJobObject] - https://github.com/estimated1337/custom_data_ptr_swap_sample [NtQueryLicenseValue] - https://github.com/zer0condition/ZeroThreadKernel [NtCreateCompositionSurfaceHandle] - https://github.com/gmh5225/NullDriverCheat [NtOpenCompositionSurfaceSectionInfo] - https://www.unknowncheats.me/forum/anti-cheat-bypass/560809-firmwaretablehandler.html [FirmwareTableHandler] > EFI Driver - https://github.com/mrexodia/EfiCMake - https://github.com/tandasat/MiniVisorPkg - https://github.com/Shtan7/VisualUEFI-2.0 [Debug source with clion+clang+gdb] - https://github.com/SamuelTulach/EasyUefi [Visual Studio template for GNU-EFI] - https://github.com/btbd/umap [EFI Manual Map] - https://github.com/ekknod/sumap [EFI Manual Map] - https://github.com/xtremegamer1/xigmapper [EFI Manual Map] - https://github.com/Valthrun/valthrun-uefi-mapper [EFI Manual Map] - https://github.com/ekknod/KiSystemStartupMeme [Custom KiSystemStartup] - https://github.com/SamuelTulach/efi-memory [RPM] - https://github.com/TheCruZ/EFI_Driver_Access [RPM] - https://github.com/gmh5225/Driver-efi-bootkit - https://github.com/SamuelTulach/rainbow [HWID] - https://github.com/gmh5225/-Rainbow---EFI [HWID] - https://github.com/Kiaoee/Fortnite-EFI-External [Fortnite] - https://github.com/ajkhoury/UEFI-Bootkit - https://github.com/SamuelTulach/negativespoofer [HWID] - https://github.com/SamuelTulach/EfiDump [Dump] - https://github.com/ekknod/Nmi [Blocking NMI interrupts] - https://github.com/ekknod/smm [Smm cheat] - https://github.com/sa413x/UEFI-Bootloader [Simple mmapper which using UEFI runtime driver] - https://github.com/realoriginal/bootlicker [Generic UEFI bootkit used to achieve initial usermode execution] - https://github.com/ekknod/efi-monitor [Hooking MmCopyMemory PG safe] - https://github.com/leap0x7b/luaboot [A fully scriptable UEFI bootloader] - https://github.com/Cr4sh/SmmBackdoorNg [UEFI backdoor] - https://github.com/Oliver-1-1/UEFI-Graphic [Simpel usage of graphic in UEFI] - https://github.com/Jamesits/BGRTInjector [Changes the boot screen image on a UEFI computer] > QEMU/KVM/PVE - https://github.com/david942j/kvm-kernel-example [Guide] - https://github.com/airbus-seclab/qemu_blog [Guide] - https://github.com/BigAnteater/KVM-GPU-Passthrough [GPU Passthrough] - https://github.com/ispras/qemu/tree/windbg [Windbg] - https://github.com/cyberus-technology/virtualbox-kvm [VirtualBox with KVM Backend] - https://github.com/Qemu-Gang - https://github.com/memflow/memflow-kvm - https://github.com/IntroVirt/IntroVirt [Guest introspection library] - https://github.com/MisterY52/apex_dma_kvm_pub - https://github.com/SamuelTulach/BetterTiming [Bypass CPU Timing] - https://github.com/WCharacter/RDTSC-KVM-Handler [Bypass RDTSC] - https://github.com/batusan/Hardened-qemu [Hidden QEMU] - https://github.com/zhaodice/qemu-anti-detection [Hidden QEMU] - https://github.com/kila58/qemu-patched [Hidden QEMU] - https://github.com/Scrut1ny/Hypervisor-Phantom [Hidden QEMU] - https://github.com/zhaodice/proxmox-ve-anti-detection [Hidden PVE] - https://github.com/tteck/Proxmox [PVE Helper Scripts] - https://github.com/nyx-fuzz/QEMU-Nyx [Intel-PT] - https://github.com/doomedraven/Tools/blob/master/Virtualization/kvm-qemu.sh [QEMU Script] - https://github.com/GlacierW/MBA [QEMU Malware Behavior Analyzer] - https://github.com/Qemu-Gang/Escape-from-TuxKov [EFT] - https://github.com/LWSS/Ape-ex-Abominations [Apex] - https://github.com/Qemu-Gang/QemuUnrealDumper-4.25 [UE SDK Dump By QEMU] - https://github.com/panda-re/panda [Platform for Architecture-Neutral Dynamic Analysis] - https://github.com/cs1ime/blacksun-framework [Framework for game cheat development] - https://github.com/cs1ime/ceserver-rawmem [CE] - https://github.com/gmh5225/kvm-csgo-cheat [CSGO] - https://github.com/gmh5225/cs16-trigger-kvm [CS1.6] - https://github.com/tenclass/mvisor [C++ remake] - https://github.com/k3v1n1990s/docker-win [wsl2] - https://github.com/SingularityCloud/KVM.Performance [ioapic] > Wine - https://github.com/ValveSoftware/Proton [Steam] > Anti Screenshot - https://github.com/KANKOSHEV/NoScreen [Hide Window] - https://github.com/gmh5225/dwmhook [DWM] - https://github.com/wongfei/wda_monitor_trick - https://github.com/Mes2d/Screenshot-Detection-Bypass [BitBlt] > Spoof Stack - https://github.com/mgeeky/ThreadStackSpoofer - https://github.com/danielkrupinski/x86RetSpoof - https://github.com/Apex-master/return-address-spoofing - https://github.com/Peribunt/Exception-Ret-Spoofing - https://github.com/Peribunt/Ret-Spoofing - https://github.com/WithSecureLabs/CallStackSpoofer - https://github.com/Barracudach/CallStack-Spoofer - https://github.com/frkngksl/NimicStack - https://github.com/thesecretclub/callout-poc - https://github.com/veryboreddd/Return-address-spoofer - https://www.unknowncheats.me/forum/anti-cheat-bypass/512002-x64-return-address-spoofing.html - https://github.com/Kudaes/Unwinder [Another approach to thread stack spoofing] - https://github.com/klezVirus/SilentMoonwalk [a TRUE call stack spoofer] - https://github.com/gmh5225/spoof-stack-SafeCall [header only] - https://github.com/fortra/hw-call-stack [HWBP] - https://github.com/evilashz/ProxyAPICall [Custom stack call] - https://github.com/Kudaes/Shelter [ROP-based sleep obfuscation] > Hide - https://github.com/JKornev/hidden - https://github.com/sina85/hide-file [Hide File] - https://github.com/ch3rn0byl/ANTfs [Delete File] - https://github.com/KANKOSHEV/NoScreen [Hide Window] - https://github.com/gmh5225/WindowProtect [Hide Window] - https://github.com/nlepleux/MappedCallback [Hide Callback] - https://github.com/rogerxiii/kernel-codecave-poc [Find Codecave] - https://github.com/armvirus/SinMapper [Manual Map In Signed Driver] - https://github.com/0xf1a/DSMM [Discarded Driver Section Manual Map] - https://github.com/ekknod/sumap [EFI Manual Map] - https://github.com/VollRagm/lpmapper [Manual Map To Large Page Driver] - https://github.com/armvirus/CosMapper [Signed Driver Map] - https://github.com/gmh5225/HideDriverTesting [Hide Driver] - https://github.com/IcEy-999/Drv_Hide_And_Camouflage [Hide Driver] - https://github.com/BadPlayer555/TraceCleaner [Driver Trace Cleaner] - https://github.com/Sentient111/ClearDriverTraces [Driver Trace Cleaner] - https://github.com/KelvinMsft/NoTruth [Hide Memory By VT] - https://github.com/EBalloon/MapPage [Self Map Driver] - https://github.com/Compiled-Code/eac-mapper [Self Map Driver] - https://github.com/nbqofficial/HideDriver [Hide Driver By Modify Flink/Blink] - https://github.com/ExpLife0011/HideDriver [Hide Driver By MiProcessLoaderEntryk] - https://github.com/gmh5225/Driver-HideKernelThread-IoCancelIrp [Hide Kernel Thread] - https://github.com/kitty8904/blanket [Hide Kernel Thread] - https://github.com/jxy-s/herpaderping [Hide Process/File] - https://github.com/Cracked5pider/KaynStrike [Spoofs Thread Start Address] - [Using .reloc section to replace the typical allocation calls](https://github.com/gmh5225/memory-relocalloc) - https://github.com/longpoxin/hideroot [Magisk] - https://github.com/Rwkeith/Diglett [Hide Kernel Thread] - https://github.com/gmh5225/Driver-SessionMapper [Session Driver] - https://github.com/gmh5225/Map-file-in-system-space [MiMapViewInSystemSpace] - https://github.com/gmh5225/Driver-DriverNoImage [Hijack Driver] - https://github.com/gmh5225/Driver-Systemthread-from-PspCidTable-src [Hide Process/Thread/Handle] - https://github.com/reveny/Android-Library-Remap-Hide [Remap a library for Android] > Anti Forensics - https://github.com/PaulNorman01/Forensia > Triggerbot & Aimbot - https://github.com/changeofpace/MouHidInputHook - https://github.com/gmh5225/AcDrv [mouse hook] - https://github.com/ekknod/MouseClassServiceCallbackTrick - https://github.com/ekknod/MouseClassServiceCallbackMeme - https://github.com/blackhades00/PareidoliaTriggerbot - https://github.com/adspro15/DirectInput - https://github.com/nbqofficial/norsefire - https://github.com/petercunha/Pine [Neural Network] - https://github.com/gmh5225/AI-FPS-b00m-h3adsh0t [Neural Network] - https://github.com/univrsal/input-overlay [Keyboard Mapper] - https://github.com/Miffyli/gan-aimbots [Machine Learning] - https://github.com/RootKit-Org/AI-Aimbot [Machine Learning YOLOv5] - https://github.com/lehmenkuehler/camera-triggerbot [Camera Triggerbot] - https://github.com/BuddyBoi/KernelMoveMouse [gptCursorAsync] - https://github.com/Zpes/mouse-input-injection [NtUserInjectMouseInput] - https://github.com/gmh5225/Overwatch-1-cheat-source [NtUserInjectMouseInput] - https://github.com/gmh5225/NtUserInjectMouseInput-syscall [NtUserInjectMouseInput SYSCALL] - https://github.com/gmh5225/ClickPic [OpenCV + Triggerbot] - https://github.com/gmh5225/OpenCV-SmartAimBot [OpenCV + Triggerbot] - https://github.com/Lexikos/AutoHotkey_L - https://github.com/tgillam/HumanMouseMovement - https://github.com/Chaoses-Ib/IbInputSimulator [Simulating keyboard, mouse] - https://github.com/gmh5225/razer-rzctl [Razer] - https://github.com/vsaint1/kernel-mouse [MouClass] - https://github.com/gmh5225/android_touch [For Android] - https://github.com/muchenspace/android_virtualTouch [For Android] - https://github.com/gmh5225/PTFakeTouch [For IOS] > WallHack - https://github.com/DrNseven/D3D11-Wallhack > HWID - https://github.com/dword64/Ow-Anti-Flag - https://github.com/btbd/hwid - https://github.com/gmh5225/Driver-HWID-btbd-modified - https://github.com/gmh5225/HWID-Permanent-HWID-Spoofer - https://github.com/gmh5225/PrecisionSpoofer-CPP - https://github.com/Theordernarkoz/Hwid-Spoofer-EAC-BE - https://github.com/semihcevik/hwidspoofer - https://github.com/Theordernarkoz/Hwid--Spoofer - https://github.com/Theordernarkoz/Hwid-Spoofer - https://github.com/gmh5225/Apex-Spoofer - https://github.com/gmh5225/HWID-EclipsedSpoofer-EAC-BE - https://github.com/BuzzerFelix/HWIDSpooferEAC - https://github.com/SamuelTulach/rainbow [EFI] - https://github.com/firebitsbr/-Rainbow---EFI [EFI] - https://github.com/btbd/wpp [Intercepting DeviceControl via WPP] - https://github.com/vmcall/owned_alignment [Abusing Alignment] - https://github.com/mopped7/Hwid-Spoofer-Game-Anticheat-Cleaners-Unban-Any-Games-Drivers - https://github.com/gmh5225/HWID-Kernel-Spoofer - [HWID-Spoofer-UD-Fortnite-WarZone-Apex-Rust-Escape-From-Tarkov-and-all-EAC-BE-Games-IMGUI-Loader-Base](https://github.com/KakashiiiSan/HWID-Spoofer-UD-Fortnite-WarZone-Apex-Rust-Escape-From-Tarkov-and-all-EAC-BE-Games-IMGUI-Loader-Base) - https://github.com/SamuelTulach/mutante - https://github.com/Veuqx0/ImGui-Spoofer-Leaked - https://github.com/gupr0x4/HWID-Spoofer-for-Fortnite-and-Valorant - https://github.com/gmh5225/Full-Hwid-Spoofer-V6 - https://github.com/gmh5225/HWID-SteamSpywareTerminator [Steam] - https://github.com/SamuelTulach/negativespoofer [EFI] - https://github.com/Alex3434/wmi-static-spoofer - https://github.com/ReFo0/hwid-spoofer - https://github.com/namazso/hdd_serial_spoofer - https://github.com/gmh5225/EASY-HWID-SPOOFER - https://github.com/singhhdev/Spoofer-AMIDEWIN - https://github.com/gmh5225/HWID-Pasted-Hwid-Spoofer - https://github.com/Skotschia/hwid_spoofer - https://github.com/SamuelTulach/tpm-spoofer [TPM] - https://github.com/s0ngidong3/TPM-SPOOFER [TPM] - https://github.com/Android1500/AndroidFaker [Android] > Bypass Page Protection - https://github.com/illegal-instruction-co/CountHook [WorkingSet] > SDK CodeGen - https://github.com/cursey/sdkgenny - https://github.com/praydog/luagenny - https://github.com/ssyuqixe/obfCoder > Game Engine Explorer:Unreal - https://github.com/UE4SS-RE [UE RE] - https://github.com/asjbdkabs/shootergame-Hack [ShooterGame Demo] - https://github.com/cqcallaw/shootergame [ShooterGame Demo] - https://github.com/CorrM/CleanCheat [Game cheat base] - https://github.com/Encryqed/Dumper-7 [SDK Dump for all of UE4 and UE5] - https://github.com/Spuckwaffel/UEDumper [SDK Dump for UE 4.19 - 5.2] - https://github.com/BadBrojo/UEDumper-MemProcFS [UEDumper+MemProcFS 4.19 - 5.2] - https://github.com/Chuan212/UnrealSDKDumper [SDK Dump for UE 4.23 - 4.27] - https://github.com/BobHUnrealTech/UnrealSDKDumper-4.25 [SDK Dump for UE 4.23 - 4.27] - https://github.com/Shhoya/Shh0yaUEDumper [SDK Dump] - https://github.com/guttir14/UnrealDumper-4.25 [SDK Dump] - https://github.com/EZFNDEV/UEDumper [SDK Dump] - https://github.com/gmh5225/frida-ue4dump [SDK Dump For Android/IOS] - https://github.com/MJx0/AndUE4Dumper [SDK Dump For Android] - https://github.com/kp7742/UE4Dumper [SDK Dump For Android] - https://github.com/gmh5225/UE4-Apk-Dumper [SDK Dump For Android] - https://github.com/Zakaria-Master/UE4Dumper_Emulator [SDK Dump For Android] - https://github.com/BigWhite666/BigWhiteTool [SDK Dump For Android] - https://github.com/MJx0/iOS_UE4Dumper [SDK Dump For IOS] - https://github.com/CorrM/Unreal-Finder-Tool [SDK View] - https://github.com/spudgy/UnrealEngine4-SwissKnife [SDK View] - https://github.com/shalzuth/UnrealSharp [SDK View] - https://fearlessrevolution.com/viewtopic.php?f=23&t=14414 [UE4 CE Table] - https://github.com/cursey/ue4genny [SDK Generator] - https://github.com/Zebratic/UE4Injector [Inject] - https://github.com/N-T33/UE4-Silent-Aim [Aimbot] - https://github.com/YMY1666527646/ue4_base [SDK Template] - https://github.com/percpopper/UE4-Freecam [FOV Changer] - https://github.com/RussellJerome/UnrealModLoader [Mod Loader] - [Intercept ProcessEvent calls on any game object (Unreal Engine 4)](https://github.com/Skengdo/ue4-processevent-intercept) - [UE4 Cheat Source Code](https://github.com/1hAck-0/UE4-Cheat-Source-Code) - https://github.com/bbgsm/ue4_cheat_engine [UE4 Cheat For Android] - [unpack, pack, list, check and mount Unreal Engine 4 .pak archives](https://github.com/panzi/rust-u4pak) - https://github.com/Qemu-Gang/QemuUnrealDumper-4.25 [SDK Dump By QEMU] - https://github.com/gmh5225/UE-UnrealEngineSDK [Universal Cheat development kit] - https://github.com/atenfyr/UAssetGUI [Viewing and modifying UE4 game assets] - https://github.com/UE-Explorer/UE-Explorer [Browser and decompiler for UE packages] - https://github.com/UE4SS-RE/RE-UE4SS [Re-Host of Unreal Engine 4/5 Scripting System] - https://github.com/SerseDioRe/Unreal-Engine-5-PDB [UE5 PDB] > Game Engine Explorer:Unity - https://github.com/mono/mono [mono] - https://github.com/dnSpy/dnSpy-Unity-mono [mono] - https://github.com/Misaka-Mikoto-Tech/MonoHook [mono hook] - https://github.com/dnSpy/Mono.Debugger.Soft [Mono Debugger] - https://github.com/imerzan/unispectDMAPlugin [Mono Dump + DMA] - https://github.com/Perfare/Il2CppDumper [Il2Cpp Dump] - https://github.com/khang06/Il2CppDumper-YuanShen [Il2Cpp Dump for Genshin Impact] - https://github.com/Perfare/Il2CppDumper [Il2Cpp Dump GUI] - https://github.com/Poko-Apps/Il2cppDumpDroidGUI [Il2Cpp Dump GUI] - https://github.com/shalzuth/Il2CppRuntimeDumper [Il2Cpp Dump Runtime] - https://github.com/Perfare/Zygisk-Il2CppDumper [Il2Cpp Dump for Android Platform] - https://github.com/kp7742/IL2CPPDumper [Il2Cpp Dump for Android Platform] - https://github.com/yukiarrr/Il2cppSpy [Unity IL2CPP Disassembler (for apk)] - https://github.com/djkaty/Il2CppInspector [Il2Cpp Dump] - https://github.com/oobbb/android-il2cpp-modspeed [Il2Cpp hack speed] - https://github.com/gmh5225/qiling-il2cpp-dump [Il2Cpp Dump using qiling] - https://github.com/sinai-dev/UnityExplorer - https://github.com/4ch12dy/il2cpp [Il2Cpp Version] - https://github.com/nneonneo/Il2CppVersions [Il2Cpp Version] - https://github.com/sneakyevilSK/IL2CPP_Resolver [IL2CPP resolver] - https://github.com/extremeblackliu/IL2CPP_Resolver_External [IL2CPP resolver] - https://github.com/knah/Il2CppAssemblyUnhollower - https://github.com/reahly/mono-external-lib [External Mono Example] - https://github.com/Compiled-Code/external-il2cpp [Il2Cpp] - https://github.com/Octowolve/Il2CppSDKGenerator [Il2Cpp SDK generator for Android] - https://github.com/00christian00/UnityDecompiled [An unofficial repo of decompiled Unity dll files] - https://github.com/knah/Il2CppAssemblyUnhollower [Managed->IL2CPP proxy assemblies] - https://github.com/CodeCracker-Tools/MegaDumper [Dump native and .NET assemblies] - https://github.com/SeriousCache/UABE [Extracting assets] - https://devxdevelopment.com/Unpacker [Extracting assets] - https://github.com/AssetRipper/AssetRipper [Extracting assets] - https://github.com/Perfare/AssetStudio [Extracting assets] - https://github.com/axhlzy/Il2CppHookScripts [Il2Cpp Hook Scripts] - https://github.com/gmh5225/Il2Cpp-HookScripts [Il2Cpp/Mono Hook Scripts] - https://github.com/BataBo/ACEPatcher [.NET Patcher] - [A tool translate a apk file to common android project and support so hook include il2cpp c++ scaffolding](https://github.com/Efaker/FakerAndroid) - https://github.com/xxzzddxzd/unitySpeedTools [IOS Speed Tools] - https://github.com/gmh5225/il2cpp-finder [Il2Cpp Finder] - https://github.com/gmh5225/frida-il2cpp-datacollector [Il2Cpp datacollector for Android/IOS] - https://github.com/BepInEx/BepInEx [plugin/modding framework] - https://github.com/gmh5225/IL22CPP [ReMake of Il2cpp internal reflection system in C++] - https://github.com/sunnamed434/UnityVulnerableEntryPoint [Looks for a vulnerable entry point] - https://github.com/Azvanzed/MatScan [A multi-threaded rust material scanner] - https://github.com/vfsfitvnm/frida-il2cpp-bridge [Frida dump Il2Cpp] - https://github.com/issuimo/UnityResolve.hpp [Unity cheat framwork] - https://github.com/ByNameModding/BNM-Android [Modding il2cpp games] - https://github.com/SsageParuders/CheatUnityGames [Unity cheat framwork] - https://github.com/sanqiuu/AndroidCheatTemplate [Unity cheat framwork] > Game Engine Explorer:Source - https://github.com/anarh1st47/Source2Dumps [Dump] - https://github.com/CallumCVM/ValveGen [SDK Generator] - https://github.com/praydog/Source2Gen [SDK Generator] - https://github.com/neverlosecc/source2gen [SDK Generator] - https://github.com/keowu/sourceengineexplorer [Explorer] - https://github.com/neverlosecc/source2sdk > Explore UWP - https://github.com/Wunkolo/UWPDumper - https://github.com/Francesco149/uwpinject [dll injector for uwp apps] - https://github.com/Francesco149/uwpspy [dll that hooks uwp interfaces] > Explore AntiCheat System:VAC - https://github.com/danielkrupinski/VAC-Bypass-Loader - https://github.com/danielkrupinski/vac-hooks - https://github.com/mdilai/Shtreeba [Injector] - https://github.com/zyhp/vac3_inhibitor - https://github.com/krispybyte/Vook [VAC hook] - https://github.com/ioncodes/vacation3-emu [VAC3 module emulator] - https://github.com/altoid29/VACDumper [Dump] - https://github.com/x1tan/vac3-dumper [Dump] - https://github.com/nevioo1337/VAC-ModuleDumper [Dump] - https://github.com/Jackbail4/VAC-Bypass - https://github.com/n00bes/PreventVAC - https://github.com/b1scoito/cozinha_loader [Injector] - https://github.com/shuruk421/VACKeyRetrieval [Retrieves VAC module ice encryption key] - https://github.com/RenardDev/DumpVAC [PoC to disable VAC and dump modules with automatic decryption] > Explore AntiCheat System:EAC - https://github.com/thesecretclub/CVEAC-2020 [Integrity Checks] - https://github.com/Schnocker/EAC_dbp [Debug] - https://github.com/Compiled-Code/eac-mapper [Eac Mapper] - https://github.com/EBalloon/MmCopyMemory [Bypass MmCopyMemory] - https://github.com/gmh5225/EAC-Kernel-Packet-Fucker [Packet Fucker] - https://github.com/gmh5225/EAC-HydraHook [Packet Fucker] - https://github.com/woomy144/EazyAntiCheatSRC [Reversed Source] - https://github.com/chaeyk/eac-leak [EAC sdk's memory leak] - https://github.com/gmh5225/EAC [SDK] - https://github.com/ksoju/Eac-Bypass - https://github.com/EBalloon/EasyAntiCheat-SRC - https://github.com/gmh5225/EAC-EasyAntiCheat-Src-1 - https://www.unknowncheats.me/forum/anti-cheat-bypass/458928-eacs-maskable-interrupt-callback.html [NMI] - https://www.unknowncheats.me/forum/anti-cheat-bypass/464943-eac-nmi-bypass-callbacks.html [NMI Bypass] - https://github.com/CheeZeDark/EasyAntiCheat-Reversing - https://github.com/Sinclairq/hiearchy-eac [Integrity Checks] - https://github.com/Rat431/EAC_Emu [Simple EasyAntiCheat x64 emulator] - https://github.com/xBrunoMedeiros/eac-overlay [EAC Overlay] - https://github.com/gmh5225/ce-EasyAntiCheat-Bypass [UD CE] - https://github.com/ioncodes/pooldump [Extract the DLL that EACs manualmaps into the game process] - https://github.com/gmh5225/EAC-VmCheck.asm [Virtual machine checking] - https://www.unknowncheats.me/forum/anti-cheat-bypass/561479-eacs-instrumentation-callback-bypass.html - https://github.com/gmh5225/Eac-Injector-Driver [Injector] - https://github.com/gmh5225/EAC-EasyAntiCheatMemorySig [Memory sig maker] - https://github.com/gmh5225/EAC-shellcode-1 [Shellcode] - https://github.com/gmh5225/EAC-Driver-UD-for-now [Sample] - https://github.com/lguilhermee/EAC-Extractor-Utility [Decrypt and Extract the files from the EAC] - https://advancedvectorextensions.github.io/posts/easyanticheat-eprocess-emulation [EProcess Emulation] - https://advancedvectorextensions.github.io/posts/easyanticheat-cr3-protection [CR3 Protection] - https://github.com/Sinclairq/hierarchy-eac [Bypassing self-integrity] - https://github.com/SamuelTulach/eac_cr3_shuffle [Bypassing CR3 protection] - https://github.com/Robert01337/Bypassing-EasyAntiCheat-Integrity-check [Bypassing integrity check] - https://github.com/CamxxCore/EasyAntiCheat-Emulator [EAC Emulator] - https://github.com/Azvanzed/EAC-Runtime-Extractor [Extracts eac's driver at runtime without it touching the disk] - https://gist.github.com/gmh5225/b89938f55bcb65637168f88a433c3d4d [Skip EAC thread detection] - https://github.com/kprprivate/EAC-CR3-BYPASS [A simple UM + KM example of how to bypass EAC CR3] > Explore AntiCheat System:BE - https://github.com/Schnocker/NoEye - https://github.com/ZoondEngine/NoBastian_v2 [Elevating Handle By LSASS] - https://github.com/haram/splendid_implanter - https://github.com/HadockKali/battleye-user-mode-bypass [SetWindowsHookExW] - https://github.com/unreaIuser/BE-Emulator - https://github.com/masterpastaa/BattlEye-Handler-BYPASS - https://github.com/dllcrt0/battleye-decryption - https://github.com/dllcrt0/bedaisy-reversal - https://github.com/dllcrt0/battleye-shellcode [shellcode] - https://github.com/gmh5225/BE-BattlEye_shellcode [shellcode] - https://github.com/Compiled-Code/be-injector [Attack COW] - https://github.com/Aki2k/BEDaisy - https://github.com/Luohuayu/BadEye - https://github.com/zouxianyu/BlindEye [Packet Fucker] - https://github.com/huoji120/goodeye - https://github.com/LilPidgey/BEClient - https://github.com/lguilhermee/Battleye-Shellcode-Dumper [BEClient2.dll Dumper] - https://github.com/es3n1n/be-shellcode-tester [BattlEye shellcodes tester] - https://github.com/steffalon/battleye-rust [BattlEye RCON UDP connection] - https://github.com/Hypercall/FakeEye [Emulator] - https://github.com/mexploitui/FakeEye [Emulator] - https://github.com/tr1xxx/battleye-region-walking - https://github.com/SurgeGotTappedAgain/Pink-Eye - https://github.com/R4YVEN/beservice_intcallbacks [Instrumentation Callback] - https://github.com/crtdll/bedaisy-bypass [BEDaisy.sys report bypass] > Explore AntiCheat System:EQU8 - https://blog.back.engineering/12/08/2021 - https://github.com/kkent030315/EQU8-PoC - https://github.com/hotline1337/equ8_bypass > Explore AntiCheat System:Ricochet - https://github.com/weak1337/ricochet_deobfuscator - https://github.com/gmh5225/AurumRE - https://github.com/gmh5225/ricochet-disabler > Explore AntiCheat System:RIOT - https://github.com/Nuxar1/DecryptionDumper [Dump] - https://github.com/lil-skies/val-exception-handler [ZwRaiseException Dump] - https://github.com/gmh5225/Dump-val-exception-handler [RtlpCallVectoredHandlers Dump] - https://github.com/AdvancedVectorExtensions/VanguardImportResolver [Resolve vgk's protected imports] - https://github.com/armvirus/VanguardTrace [Decrypting and intercepting encrypted imports of Vanguards Kernel Driver] - https://www.unknowncheats.me/forum/anti-cheat-bypass/578829-unveiling-unseen-vanguards-guarded-regions.html [CR3 Protection] > Explore AntiCheat System:XignCode - https://github.com/Skengdo/XignCode-Dump - https://github.com/st4ckh0und/XignCode3-bypass-alternative - https://github.com/st4ckh0und/XignCode3-bypass > Explore AntiCheat System:ACE - https://github.com/H3d9/sguard_limit - https://github.com/rogxo/ReadPhys > Explore AntiCheat System:G-Presto - https://github.com/ARandomPerson7/G-Presto-Anti-Cheat-Reverse-Engineered/blob/main/Main.cpp > Explore AntiCheat System:NeacSafe - https://github.com/gmh5225/NeacSafe-Analysis > Explore AntiCheat System:BadlionAnticheat - https://github.com/KiFilterFiberContext/BadlionLogger > Explore AntiCheat System:Byfron - https://byfron.com/ - https://www.unknowncheats.me/forum/anti-cheat-bypass/505486-byfron-tech-anti-cheat-released.html - https://gist.github.com/gmh5225/cbe40345a9400b01329e025478ffb826 [hash] - https://github.com/EnrickMartins/byfron-bypass > Explore AntiCheat System:NGS - https://github.com/st4ckh0und/NexonGameSecurity-bypass - https://github.com/st4ckh0und/NexonGameSecurity-bypass-alternative - https://github.com/st4ckh0und/NexonGameSecurity-bypass-wow64 > Explore AntiCheat System:FACEIT - https://github.com/ekknod/EC_PRO-LAN > Explore AntiCheat System:CS2 - https://github.com/danielkrupinski/cs2-anticheat > Game:MapleStory - https://forum.ragezone.com/threads/getting-packet-structures-opcodes-using-ida.792436/ [Packet] - https://github.com/Bratah123/SpiritIDAPlugin [IDA-Plugin] - https://github.com/icelemon1314/mapleLemon [Private Server-CMS-027] - https://github.com/ellermister/MapleStory [Private Server-CMS-079] - https://github.com/mrzhqiang/ms079 [Private Server-CMS-079] - https://github.com/unsafeblackcat/MapleStoryEx [Private Server-CMS-079] - https://github.com/gmh5225/maplestory-v83MaplestoryCPP [Private Server-GMS-083 C++] - https://github.com/Fraysa/Destiny [Private Server-GMS-083 C#] - https://github.com/Bratah123/ElectronMS [Private Server-KMS-316] - https://github.com/reanox/MapleStory-v113-Server-Eimulator [Private Server-TMS-113] - https://github.com/izarooni/MapleEzorsia [v83 edits for creating a custom resolution client] - https://github.com/Bratah123/BattleAnalysis176 [Battle Analysis] - https://github.com/johnsonjason/MapleStoryBuildFramework [AntiCheat] - https://github.com/Noosh404/Maplestory-V179-Cheat-Engine [V179 CT] - https://github.com/gmh5225/MapleStory-HeavenClient [Heaven Client] - https://github.com/Inndy/TWMS-Hacking-Data [TMS CT] - https://github.com/Inndy/MSDoggy [TMS Old Hack] - https://github.com/PrinceFroggy/MSB [GMS Old Hack 128-140] - https://github.com/PrinceFroggy/MSC [GMS Bot] - https://github.com/v3921358/Rebirth [Private Server-GMS-095 C#] - https://github.com/MapleStoryGameHack/mnwvs196 [Private Server-TMS-196] - https://github.com/Maxcloud/MapleResearch [GMS-095 Client Analysis] - https://github.com/neeerp/RustMS [Private Server-Rust] - https://github.com/Kagamia/WzComparerR2 [Maplestory online Extractor] - [Generate machine learning object detection samples from Maplestory in different formats](https://github.com/charlescao460/MapleStoryDetectionSampleGenerator) - https://github.com/Elem8100/MapleStory-GM-Client [Offline MapleStory Client Emulator] - https://github.com/gmh5225/maplestory-packer-ModPacker [MapleStory Wolrds .mod file packing/unpacking tools] - https://github.com/Riremito/JMSv186 [JMS v186] - https://github.com/ryantpayton/MapleStory-Client [HeavenMS Client] - https://github.com/ryantpayton/MapleStory-Server [HeavenMS Server] - https://github.com/YohananTzeviyah/LibreMaple-Client [LibreMaple Client] - https://github.com/speedyHKjournalist/MapleServerAndroid [GMS 083 server on Android] - https://github.com/Bratah123/ElectronMS [Private Server-KMS-316] - https://github.com/SoulGirlJP/AzureV316 [Private Server-KMS-316] - https://github.com/Elem8100/MapleNecrocer [MapleStory Client Emulator] > Game:Minecraft - [A minecraft server backend written in c++](https://github.com/mmbednarek/minecpp) > Game:Sword With Sauce - https://github.com/1hAck-0/UE4-Cheat-Source-Code > Game:Gunfire Reborn - https://github.com/shalzuth/AutoGunfireReborn > Game:Fall Guys - https://github.com/shalzuth/FallGuysSharp - https://github.com/ioncodes/FallGuys - https://github.com/aci1337/Flying-Guys-fully-modified - https://github.com/FarmEquipment69/FlyingGuys > Game:Remnant - https://github.com/shalzuth/RemnantESP > Game:LostArk - https://github.com/shalzuth/LostArkDumper - https://github.com/shalzuth/LostArkLogger - https://github.com/realrespecter/LOST-ARK-SDK - https://github.com/cpz/Lost-Ark-SDK - https://github.com/cpz/LostArk > Game:Battlerite - https://github.com/shalzuth/BattleriteBot > Game:CrossFire - https://github.com/crvvdev/titancf - https://github.com/serjam/cfclap > Game:TGame - https://github.com/3tnet/nzPerspective [D3D9] > Game:LOL - https://github.com/LeagueSharp - https://github.com/SwipeDan/LeagueSharp - https://github.com/ensoulsharp-io - https://ferrisbot.com/ferrisaio - https://github.com/SwipeDan/EloBuddy-Addons - https://github.com/shalzuth/LeagueSharp - https://github.com/shalzuth/LoLClient - https://github.com/RyukOP/L-Assemblies - https://github.com/korllan/LeagueSharp.Loader - https://github.com/R3nzTheCodeGOD/R3nzSkin [Skin] - https://github.com/R3nzTheCodeGOD/R3nzSkinTFT [Skin] - https://github.com/B3akers/LeagueSkinChanger [Skin] - https://github.com/real-web-world/hh-lol-prophet - https://github.com/Nuxar1/DecryptionDumper [Dump] - https://github.com/tarekwiz/LeagueDumper [Dump] - https://github.com/tarekwiz/League-Unpacker [Dump] - https://github.com/0x6461726B/lol-offset-dumper [Dump] - https://github.com/LeaguePrank/LeagueTeamBoost - https://github.com/LeagueSandbox - https://github.com/MythicManiac/lol-unpackman - [A bran-new League of Legends assistant software, a replacement for WeGame](https://github.com/Java-S12138/frank) - https://github.com/orkido/LViewLoL [Python based scripting platform] - https://github.com/KebsCS/KBotExt [LCU] - https://github.com/botkalista/ayaya-league-external [Nodejs based scripting platform] - https://github.com/jfd02/TFT-OCR-BOT [TFT] - https://github.com/sooqua/VanderLeague [Hypervisor-assisted] - https://github.com/KebsCS/League-DirectX11-Internal [Internal] - https://github.com/sr-henry/league-base [External] > Game:NARAKA - https://www.unknowncheats.me/forum/other-fps-games/490052-naraka-bladepoint-reversal-structs-offsets.html - https://github.com/xkp95175333/DummyDlls_NARAKA_1_9_21 [Dump] - https://github.com/Rythorndoran/Naraka-Hack > Game:Thetan - https://github.com/xkp95175333/Thetan_ArenaSDK > Game:Dota2 - https://github.com/ikhsanprasetyo/dota2dumped [Offset dumper] - https://github.com/skrixx68/Dota2-Overlay-2.0 - https://github.com/gmh5225/Dota2-Overlay-OffsetUpdater - https://github.com/interception-team/dota-cheat - https://github.com/LWSS/McDota [linux] - https://github.com/ExistedGit/Dota2Cheat > Game:WOW - https://github.com/helloobaby/wow-IAT-fix - https://github.com/namreeb/dumpwow - https://github.com/adde88/WoWDumpFix - https://github.com/xakepru/x14.08-coverstory-blizzard - https://github.com/fail46/OHack [An open-source hack for World of Warcraft] - https://github.com/adde88/SkyEngine [Wow Lua Unlocker] - https://github.com/gmh5225/WOW-WowAutoFishing [Auto Fishing] > Game:Warcraft III - https://github.com/stijnherfst/HiveWE [editor] > Game:Half-Life 2 - https://github.com/codereversing/hl2aimbot - https://github.com/codereversing/hl2esp > Game:CS1.6 - https://github.com/k4ne1337/hpp-hack - https://github.com/BloodSharp/CSHackCreator-2-Demo - https://github.com/oxiKKK/oxware - https://github.com/execnone/simple-cs-16-multihack - https://github.com/bit-paper/sakura - https://github.com/eversinc33/1.6_C2 [C2] > Game:CSGO - https://github.com/csgohacks/master-guide [Guide] - https://github.com/Akandesh/blazedumper [Offset] - https://github.com/frk1/hazedumper [Offset] - https://github.com/KittenPopo/csgo-offsets [Offset] - https://github.com/ofDataa/offsets [Offset] - https://github.com/Akandesh/csgo_auto_dumper [Auto Dump] - https://github.com/dretax/GarHal_CSGO - https://github.com/danielkrupinski/Osiris - https://github.com/danielkrupinski/GOESP [Cross-platform] - https://github.com/danielkrupinski/Anubis - https://github.com/s3pt3mb3r/Dainsleif - https://github.com/lagcomp/csgo_sdk - https://github.com/felix-rs/csgo-sdk [SDK for Rust] - https://github.com/ekknod/csf_w [Win SDK] - https://github.com/ekknod/csf [Linux SDK] - https://github.com/Speedi13/ROP-COMPILER - https://github.com/AimTuxOfficial/AimTux [Linux] - https://github.com/seksea/gamesneeze [Linux] - https://github.com/otvv/csgo-linux-cheat-sdk [Linux] - https://github.com/EternityX/DEADCELL-CSGO - https://github.com/nbqofficial/kernel-csgo - https://github.com/HeathHowren/CSGO-Cheats - https://github.com/Kruziikrel1/CSGO-FindMDL [Model Changer] - https://github.com/ekknod/nv_v2 [Sound ESP] - https://github.com/DerGrosse-prog/Improved-CSGO_Simple - https://github.com/0TheSpy/SpyExternal1337hax [External] - https://github.com/0TheSpy/Seaside [Internal] - https://github.com/whereisr0da/Lumina-Cheat [Internal] - https://github.com/nbqofficial/norsefire [Driver + Mouse Emulation] - https://github.com/boltgolt/boltobserv [Radar] - https://github.com/worse-666/csgo_external_ahk_hack [External] - https://github.com/ch4ncellor/CSGO-P2C-Dumper [Dump] - https://github.com/Akatsyk/2k17-club - https://github.com/flowxrc/csgo-xenforo-loader - https://github.com/ALittlePatate/ezfrags - https://github.com/Neaxic/CSGO-MAIN-INTERNAL - https://github.com/W1lliam1337/digital-sdk - https://github.com/sneakyevilSK/CSGO_BacktrackPatch [Backtrack Patch] - https://github.com/NullTerminatorr/NullBase [External] - https://github.com/krxdev-kaan/AqHax-CSGO - https://github.com/slack69/csgo-dma-overlay [DMA] - https://github.com/rrpvm/csgo-external-cheat - https://github.com/petercunha/Pine [Neural Network] - https://github.com/Bartis1313/csgo - https://github.com/NullHooks/NullHooks [Internal] - https://github.com/Skarbo/CSGOCrosshair [Crosshair Generator] - https://github.com/ekknod/G37OBS [obs-studio plugin for csgo] - https://github.com/Sentient111/Csgo-Full-kernel [Running from kernelmode] - https://github.com/razixNew/CompiledProtection [Cheat Compiler] - https://github.com/ekknod/EC - https://github.com/soyware/heck_csgo_external [External] - https://github.com/martinjanas/Sensum [Internal] - https://github.com/cazzwastaken/kakhack [Internal] - https://github.com/binkynz/cstrike-hack - https://github.com/R4YVEN/raybot-zero [Kernel-mode] - https://github.com/gmh5225/CSGO-Loader [Loader] - https://github.com/gmh5225/CSGO-NIXWARE-CSGO [Nixware] - https://github.com/designer1337/csgo-cheat-base [Internal] - https://github.com/yourmnbbn/tiny-csgo-client [Tiny csgo client for connecting dedicated server] - https://github.com/click4dylan/CSGO_AnimationCode_Reversed [CSGO animation code] - https://github.com/spirthack/CSGOSimple [Internal] - https://github.com/ViddeBoiiii/CSGO-Ormbunke-x86 [Imgui Menu] - https://github.com/MavenCoding157/legit-csgo-cheat-menu [Menu] - https://github.com/skep1337/autismware [HvH] - https://github.com/emilyinure/solace-csgo [Internal] - https://github.com/bruhmoment21/csgo-sdk-improved [Internal] - https://github.com/IVBecy/cartmanv2 [Internal] - https://github.com/gmh5225/CSGO-aw-v5.1.13 [aw-v5.1.13] - https://github.com/ricencheese/csgo-bot - https://github.com/forceinline/csgo-external-esp [External] - https://github.com/VladislavAlpatov/avhook - https://github.com/si1kyyy/csgo_cheat_external [External] - https://github.com/latuh/nebulite-external [External] - https://github.com/lstrsrt/csgo_internal_base [Internal] - https://github.com/404Kurama/Astra [External] - https://github.com/gmh5225/CSGO-Alphen - https://github.com/Enzo0721/ExternalCheatV3 [External] - https://github.com/SteamDatabase/Protobufs/tree/master/csgo [Protobuf] - https://github.com/kyojig/csgo_kns [Internal] - https://github.com/M3351AN/saphire [Internal] - https://github.com/VitorMob/GHInterfacesCSGO [Internal] - https://github.com/superyu1337/memcs [External] - https://github.com/rabbitfishy/sdk [SDK] - https://github.com/bloesway/csgo_sdk [SDK] - https://github.com/DeiVid-12/SmKernel-CSGO [Driver] > Game:CS2 - https://github.com/danielkrupinski/Osiris - https://github.com/ro0ti/CS2-Offsets [Offset] - https://github.com/sezzyaep/CS2-OFFSETS [Offset] - https://github.com/Salvatore-Als/cs2-signature-list [Signature] - https://github.com/bruhmoment21/cs2-sdk [SDK] - https://github.com/Omn1z/Counter-Strike2-SDK [SDK] - https://github.com/0wk/cs2-sdk [SDK] - https://github.com/gmh5225/CS2-SDK-Source2Gen [SDK] - https://github.com/FrySimpl3/SDK_CS2 [SDK] - https://github.com/nikkacs/cs2_sdk [SDK] - https://github.com/NotOfficer/cs2-sdk [SDK] - https://github.com/a2x/cs2-dumper [Dump] - https://github.com/imnotdatguy/csgo2-cheat - https://github.com/papstuc/counterstrike2 - https://github.com/nezu-cc/BakaWare4 - https://github.com/gmh5225/cs2-fov-changer [FOV changer] - https://github.com/clauadv/cs2_webradar [Radar] - https://github.com/MoZiHao/CS2_DMA_Radar [DMA Radar] - https://github.com/MoZiHao/CS2_DMA_Extrnal [DMA External] - https://github.com/gmh5225/vscript_lua51 [VScript] - https://github.com/gmh5225/cs2_things [VScript] - https://github.com/IMXNOOBX/cs2-external-esp [External] - https://github.com/UnnamedZ03/CS2-external-base [External] - https://github.com/Tokyodidit/cs2External [External] - https://github.com/TKazer/CS2_External [External] - https://github.com/Valthrun/Valthrun [External] - https://github.com/Zckyy/CS2-External [External] - https://github.com/sFIsAnExpert/CS2-External-Cheat [External] - https://github.com/gmh5225/tim_apple [External] - https://github.com/kristofhracza/tim_apple [External] - https://github.com/gmh5225/CS2-Cheat [External] - https://github.com/Half-People/HPCS2 [External] - https://github.com/gmh5225/CS2-External-1 [External] - https://github.com/CowNowK/AimStarCS2 [External] - https://github.com/Fr0go1/Aeonix-Cs2 [External] - https://github.com/xvorost/CS-2-Glow [External] - https://github.com/yinleiCoder/cs2-cheat-cpp [External] - https://github.com/ByteCorum/DragonBurn [External] - https://github.com/KisSsArt/CS2-Cheat-Base [Internal] - https://github.com/redbg/CS2-Internal [Internal] - https://github.com/Elsie-Kgafela/CS2-Cheat-Base [Internal] - https://github.com/chaycee/CS2Internal [Internal] - https://github.com/Elsie-Kgafela/csgo2-cheat [Internal] - https://github.com/vortex1573/Aurora [Internal] > Game:Assault Cube - https://github.com/gmh5225/external-esp-hack-assaultcube [GDI overlay] - https://github.com/SkarSys/AssaultCubeCheat - https://github.com/201580ag/AssaultCube_Cheat > Game:Valorant - https://github.com/apekros/valorant_offsets [Offset] - https://github.com/10HEAD/ValorantOffsets [Offset] - https://github.com/ofDataa/offsets [Offset] - https://github.com/gmh5225/valorant-externals [Offset] - https://github.com/GLX-ILLUSION/valorant-offsets-autoupdater [Offset] - https://github.com/Chuan212/ValorantOffsets-China-version [Offset] - https://github.com/hadevn/Valorant-SDK-2024 [SDK] - https://github.com/skechtew/valorant-gui-imgui-remake [GUI] - https://github.com/reahly/valorant-internal - https://github.com/gmh5225/Zenti-Valorant-Cheat-Hack-Internal-Spoofer-Driver-Injector-Protector-Auth - https://github.com/gmh5225/Valorant-Hack-Esp-Aimbot-Driver-Injector-With-Spoofer-Temporary - https://github.com/xehn1337/valorant-dumper [Dump] - https://github.com/gmh5225/Valorant-Dumper-Tool [Dump] - https://github.com/lil-skies/val-exception-handler [ZwRaiseException Dump] - https://github.com/gmh5225/Valorant-Esp-Aimbot-Hack - https://github.com/frankelitoc/UE4-c- [External] - https://github.com/AryuInka/Valorant-Cheat-External [External] - https://github.com/gmh5225/Valorant-Cheat - [Iterate And Decrypt FNamePool->Entries On Valorant](https://github.com/percpopper/VALORANT-FNamePool) - https://github.com/gmh5225/Valorant-External-1 - https://github.com/Chase1803/UCMiraka-ValorantExternal [NtUserGetPointerProprietaryId] - https://github.com/gmh5225/Valorant-CheatExternal - https://github.com/weedeej/ValorantCC [Crosshair Setting] - https://github.com/gmh5225/Internal-Valorant-Cheat - https://github.com/gmh5225/VALORANT-HACK-ESP-AIMBOT-SKINCHANGER - https://github.com/MauhTon/valorant-esp-hack-with-driver - https://github.com/MauhTon/Valorant-Aimbot-Bypass - https://github.com/zeroday-z/CyberAntLoader - https://github.com/gmh5225/Valorant.External - https://github.com/R7flex/valorant-internal-base [Internal] - https://github.com/gmh5225/VALORANT-HACK-ESP-AIMBOT-SKINCHANGER-SOURCE [Internal] - https://github.com/gmh5225/Valorant-External-Source [External] - https://github.com/gmh5225/Valorant-cheat-internal [Internal] - https://github.com/gmh5225/Valorant-Esp-Aimbot-Cheat-Hack [External] - https://github.com/94q/Valorant-Internal [Internal] - https://github.com/DX9Paster/Valorant-External-P2C-Leaked [External] - https://github.com/kali11211/valorant-internal-cheat [Internal] - https://github.com/234945/valo-driver [External] - https://github.com/kali11211/valorant-internal-cheat [Internal] - https://github.com/gmh5225/ValorantCheatExternal [External] > Game:VEILED EXPERTS - https://github.com/EBalloon/VEILED-EXPERTS-SDK - https://github.com/LagradOst/ProjectD-Win64-Shipping - https://github.com/Da3kL3o/VeiledExpertsSDK - https://github.com/percpopper/VX-It [Decrypt] > Game:COD1 - https://github.com/attilathedud/CoD_Hacks > Game:COD7 - https://github.com/nice-sprite/COD7-Tools > Game:COD Black Ops 2 - https://github.com/momo5502/t7-linker [100% accurate Black Ops 2 FastFile linker] > Game:COD Black Ops 3 - https://github.com/gmh5225/COD-boiii [Reverse engineering and analysis] > Game:COD Warzone - https://github.com/YMY1666527646/Call-of-Duty-Warzone-MW-HACK-ESP-AIMBOT - https://github.com/serjam/mwclap - https://github.com/NMan1/external-warzone-cheat - https://github.com/NMan1/warzone-internal - https://github.com/gmh5225/Call-Of-Duty-Warzone-Hack-Esp-Slient-Aimbot-Internal-Unlock-ALL - https://github.com/gmh5225/Call-Of-Duty-Vanguard-Hack-Esp-AImbot-Unlock-All - https://github.com/gmh5225/Warzone-internal-Cheat - https://github.com/SpiroHappy/Warzone-MW-Internal - https://github.com/gmh5225/-Modern-Warfare-Warzone-Cheat > Game:CODM - https://github.com/Poko-Apps/CodMDumper [il2cpp dump] - https://github.com/gmh5225/CODM-ESP-Aimbot-Mod-Menu [ESP] > Game:Battlefield 1 - https://github.com/Zakaria-Master/BF1-ESP-AND-AIMBOT - https://github.com/younasiqw/BattleField-1-Internal > Game:Battlefield 4 - https://github.com/Zakaria-Master/BF4-Internal-overlay > Game:Battlefield 2042 - https://github.com/Skengdo/battlefield-2042-internal-sdk > Game:Apex Legends - https://github.com/dhanax26/Apex-Legends-Offset-Dumper [Offset] - https://github.com/ofDataa/offsets [Offset] - https://github.com/dword64/Apex-Legends-SDK-Remaster - https://github.com/hooksteroid/ApexD3D_External - https://github.com/NMan1/apex-legends-cheat - https://github.com/gmh5225/Apex-SIMPLE-AIMBOT-GLOW-APEX - https://github.com/TheCruZ/Direct-EFI-Apex-Cheat - https://github.com/Astronaut00/apex-external - https://github.com/YMY1666527646/Phoenix-Valorant-Cheat - https://github.com/CasualX/apexbot - https://github.com/TheCruZ/Apex_Legends_Driver_Cheat - https://github.com/Keyzp1337/Fortnite - https://github.com/Zurek0x/NuremX [AI] - https://github.com/hadevn/apex_full_cheat - https://github.com/gmh5225/Apex-ApexCheeseTest - https://github.com/RavenOfTime/Apex-Legends-Esp - https://github.com/gmh5225/Apex-ApexCheat - https://github.com/Zakaria-Master/Apex_ESP_Old_Project - https://github.com/cheatingwitdacode/apex-cheating - https://github.com/LWSS/Ape-ex-Abominations [QEMU] - https://github.com/Y33Tcoder/EzApexDMAAimbot [KVM] - https://github.com/gmh5225/Apex-CHEAT-FIXED - https://github.com/gmh5225/apex_legends_sdk - https://github.com/ekknod/apex_linux [linux] - https://github.com/XRadius/project-tanya [linux] - https://github.com/EquinoxAlpha/ayypex [linux] - https://github.com/KaylinOwO/Project-Branthium - https://github.com/gmh5225/Apex-Legends-External-Esp-Aimbot-Skinchanger - https://github.com/Neurosisccc/Apex-ItemGlow [Item glow] - https://github.com/BaconToaster/UC-Apex-Remastered - https://github.com/NekoRem/apex-external [External] - https://github.com/M1fisto/nullptr-apex-external [External] - https://github.com/3nolan5/R5Apex-UserMode [External] - https://github.com/NaiJii/Apex-Mizu-Base [Internal] > Game:Fortnite - https://github.com/kem0x/FortKit [Dump] - https://github.com/ofDataa/offsets [Offset] - https://github.com/Trydos/fortnite-offsets [Offset] - https://github.com/masterpastaa/AutoOffsets [Offset] - https://github.com/Zetolac/FortniteOffsetsAndSigs [Offset] - https://github.com/Android1337/Fortnite-Offsets [Offset] - https://github.com/Luksiuss/FortniteSigsUpdatedEveryUpdate [Offset] - https://github.com/gmh5225/Fortnite-SigsUpdatedEveryUpdate [Offset] - https://github.com/gmh5225/fortnite-W2S-offset-Fortnite [Offset] - https://github.com/plu1337/fortnite-offsets [Offset] - https://github.com/gmh5225/Fortnite-Offset-dumper [Offset & Dump] - https://github.com/plu1337/fortnite-virtual-offsets [Virtual Table Offsets] - https://github.com/plu1337/fortnite-sigs [Signature] - https://github.com/F0NDO/fortnite-sigs [Signature] - https://github.com/plu1337/fortnite-exploits [Exploits] - https://github.com/ReallReaper/Fortnite-Offsets-Sigs-and-more [Offset] - https://github.com/Makk5/FortConsole - https://github.com/gmh5225/Fortnite-Leak5 - https://github.com/Zetolac/FortniteExternalW2S - https://github.com/gmh5225/Fortnite-Internal-Cheat-Fixed-and-Updated - https://github.com/gmh5225/Fortnite-EFI-External [EFI] - https://github.com/gmh5225/Fortnite-External-Cheat-WinSense-Leak - https://github.com/jooola00/fortnite-cheat-source-internal - https://github.com/YMY1666527646/Fortnite-Hack-Esp-Exploits-With-Menu - https://github.com/YMY1666527646/nigusFN - https://github.com/Sheeedsh78/Cheto-Fortnite-Source-External-EAC-BE-undetected - https://github.com/CheaterRehab/GodFather-Fortnite-Cheat-Cracked - https://github.com/Keyzp1337/Fortnite - https://github.com/vk-nom/Basic-Fortnite-Cheat-Source-Internal - https://github.com/PasterWolf/Fortnite-UD-External - https://github.com/gmh5225/Fortnite-Esp-Aimbot-Exploits-Hwid-Spoofer-Cleaner-Hack-Cheat - https://github.com/Waihbe/Fortnite-Cheat-LEAK - https://github.com/zinx-YT/Fortnite-Fltokens-and-offsets - https://github.com/gmh5225/VOLTO-EXTERNAL-SPOWAR-UD-EAC-BE-FORTNITE-EXTERNAL-CHEAT - https://github.com/gmh5225/Serenity.gg-FN-and-Loader - https://github.com/Waihbe/Fortnite-External-Cheat-Leak - https://github.com/AlfredIU/Spoofer [HWID] - https://github.com/pastor-ritz/ritz-amazing-fortnite-internal - https://github.com/plu1337/Fortnite-Masterpasta-ihack-Source-Leak - https://github.com/gmh5225/Fortnite-Evo.cc-Source-External-Cheat - https://github.com/KeyzpOnTheFluxxx/Fortnite-External - https://github.com/gmh5225/Apple-Lite-Fortnite-Cheat - https://github.com/gmh5225/Fortnite-External-Cheat-Source-Code - https://github.com/0dayatday0/BattleFN-cheat-analysis - https://github.com/gmh5225/fortnite-internal-updated-ritz [Internal] - https://github.com/JeanToBinks/Fortnite-Cheato-UD-EAC-BE - https://github.com/gmh5225/BE-Forcer-Fortnite [BE forcer for fortnite] - https://github.com/DX9Paster/Fortnite-External [External] - https://github.com/percpopper/Fortnite-CameraCachePOV - https://github.com/percpopper/Fortnite-FNameEntry - https://github.com/ritz-1337/fortnite-external-evo.gj [External] - https://github.com/simply-codes/Fortnite-External-P2C [External] - https://github.com/Zetolac/FortniteExternalExploits [External Exploits] - https://github.com/xetzzy/Fortnite-External-Source [External] - https://github.com/gmh5225/fortnite-triadz [External] - https://github.com/gmh5225/Fortnite-External-5 [External] - https://github.com/DontCry361x/ritz-amazing-fortnite-internal-updated [internal] - https://github.com/NurdAlert/flirtnite [External] - https://github.com/JetBrains-CLion/Fortnite-3.5 [Internal] - https://github.com/gmh5225/ZeroGui-Fortnite-Internal [Internal] - https://github.com/gmh5225/Fortnite-VoyagerTF [Voyager] - https://github.com/gmh5225/Fortnite-External-4 [External] > Game:Bloodhunt - https://github.com/ZZZ-Monster/bloodhunt_External - https://github.com/PhysX1337/BloodHunt-v1.1 - https://github.com/gmh5225/blood-hunt > Game:Super People - https://github.com/EBalloon/Super-People-sdk - https://github.com/gmh5225/Super-People-Esp-Aimbot-Magic-Hack - https://github.com/gmh5225/superpeople-client > Game:Splitgate - https://github.com/percpopper/Splitgate-Internal > Game:PUBG - https://github.com/owdata1/pubg-dumper [Dump] - https://github.com/orange088/pubg_dump_offset [Offset] - https://github.com/Skengdoo/pubg-external-cheat - https://github.com/ajkhoury/pubg_internal - https://github.com/iCollin/pubg-internal - https://github.com/K-cazb/pubg-public - https://github.com/gmh5225/PlayerUnknown-s-Battlegrounds-Pubg-Steam-Hack-Esp-Aimbot - https://github.com/dot1991/lilypublic - https://github.com/kurt2467/PUBG_Internal - https://github.com/gmh5225/PUBG-DX - https://github.com/gmh5225/PUBGSTAR > Game:PUBG Lite - https://github.com/Zakaria-Master/Pubg-Lite-ESP > Game:PUBGM - https://github.com/Zakaria-Master/pubgm_sdk_and_offsets [Offset] - https://github.com/atulkunal999/pubg_mobile_memory_hacking - https://github.com/Mood-Coding/pubgm_shitty_source - https://github.com/gmh5225/PUBGM-PUBGPatcher - https://github.com/Zakaria-Master/PUBGM1.6-DeadGame - https://github.com/mut1234/BYPASS-PUBG-MOBILE-IMGUI - https://github.com/busmanl30/LastIslandOfSurvival-iOSCheat-Source - https://github.com/halloweeks/pubg-mobile-pak-extract [pak extracting tool] - https://github.com/gmh5225/pubg_mobile_memory_hacking_examples - https://github.com/Super-Cssdiv/ChinaPubg - https://github.com/wantao1008hh/pubg > Game:Sausage Man - https://github.com/gmh5225/AndroidCheatTemplate > Game:The finals - https://github.com/gmh5225/the-finals-interior-cheat > Game:EFT - https://github.com/patrickcjk/TOG [Offsets Generator] - https://github.com/fcancelog/EftStreamedCheat - https://github.com/Nou4r/pKernelInterface-EFT - https://github.com/sailro/EscapeFromTarkov-Trainer - https://github.com/vmwrite/tiny_eft - https://github.com/CplNathan/Nathans-Tarkov-Radar-Public [Vmread + Radar] - https://github.com/frankie-11/eft-external - https://github.com/Splitx12/eft - https://github.com/gmh5225/eft-internal - https://github.com/gmh5225/EFT-Veil-EFT - https://github.com/Qemu-Gang/Escape-from-TuxKov [QEMU] - https://github.com/gmh5225/Comm-ImMiraclela - https://github.com/krispybyte/Simple-EFT-Base - https://github.com/bytemyass/EFTLeecher [DMA] - https://github.com/gmh5225/eft-dma-radar-1 [DMA Radar] - https://github.com/gmh5225/EFT-MonoEFT - https://github.com/ZhaoKunqi/simple-eft-superman-training-bot - https://github.com/gmh5225/EFT-NewTarkovCheatProject > Game:Arena Breakout Infinite - https://github.com/cra0/UE426_ABInfinite-Win64-Shipping [SDK] - https://github.com/Ke4ton/hardware_bypass [GPU check bypass] > Game:R6 - https://github.com/NMan1/Rainbow-Six-Cheat - https://github.com/NMan1/OverflowR6V2 - https://github.com/NMan1/Internal-Rainbow-Six-Cheat-V3 - https://github.com/beans42/epic-r6-v9 - https://github.com/Kix48/R6Updater - https://github.com/hooksteroid/R6Table_Internal - https://github.com/JGonz1337/r6-internal - https://github.com/SurgeGotTappedAgain/External-R6S-Cheat - https://github.com/vctr74/R6-Internal-V3 - https://github.com/gmh5225/R6S-internal-Cheat - https://github.com/gmh5225/Rainbow-Six-Siege-Rs6-External-Esp-Aimbot-Hack-Cheat - https://github.com/gmh5225/Rainbow-6-Siege-Cheat - https://github.com/rushzzz-max/r6-external [External] - https://github.com/ArtemisDevGroup/Artemis [Internal] - https://github.com/MuffinPanda/R6-Cheat-Dumper [External] - https://github.com/Possbl/R6S-External-V2 [External] - https://github.com/igromanru/R6-Chams-public [Chams] > Game:Overwatch - https://github.com/blackhades00/PareidoliaTriggerbot [Triggerbot] - https://github.com/OSNSON/Overwatch-1-cheat-source-. - https://github.com/vmmcall/overwatch-iat-fixer [Overwatch IAT Fixer] - https://github.com/Midi12/ow_unpack - https://github.com/gmh5225/OW-Aeternum - https://github.com/dword64/Ow-FOV [FOV] > Game:Overwatch2 - https://github.com/gmh5225/Overwatch2-colorbot-Cheats - https://github.com/gmh5225/Overwatch-2-Cheat-Aimbot-Esp - https://github.com/nismo1337/meowsense - https://github.com/gmh5225/Ow-Outlines [Shows Players through walls] - https://github.com/ZEROWyt/Overwatch-2-TOPE-EXTERNAL-CHEAT - https://github.com/gmh5225/OW2-wardenrekter [Emulate OW2 AC] > Game:Paladins - https://github.com/gmh5225/Paladins-Internal-Esp-Aimbot-Hack-Cheat-Hack - https://github.com/gmh5225/Paladins-internal-Cheat > Game:DayZ - https://github.com/zhitkur/DayZzz - https://github.com/SurgeGotTappedAgain/External-Dayz-Cheat - https://github.com/gmh5225/DayZ-Cheat - https://github.com/JonathanEke/DayZ-Server-Battleye-Remover [Disable battleye] > Game:Rust - https://github.com/Akandesh/rust-auto-dumper [Auto Dump] - https://github.com/LabGuy94/OxideDumper [Auto Dump] - https://github.com/NMan1/OverflowRust - https://github.com/gmh5225/simple-rust-hack - https://github.com/Facepunch-bot/rust-internal - https://github.com/Facepunch-bot/Rust-External - https://github.com/Facepunch-bot/Rico-Cheat-rust-external - https://github.com/spyder1g/a-pasted-rust-script - https://github.com/LordAbbot/Rust-External-Cheat - https://github.com/ZentifyZ/Kors_lol [Internal] - https://github.com/gmh5225/Rust-Internal [Internal] - https://github.com/ZentifyZ/CRC32 - https://github.com/SteepCheat/Rust-Cheat-External - https://github.com/krispybyte/Simple-Rust-Base - https://github.com/vmwrite/sapphire - https://github.com/Disline1337/Rust-Cheat-External-main - https://github.com/gmh5225/Rust-RustInternal [Internal] - https://github.com/gmh5225/rust-external-1 [External] - https://github.com/gmh5225/Rust-External [External] - https://github.com/gmh5225/Rust-ExternaL-and-Driver-AlienCheats [External] - https://github.com/Rogue619Z/Rust-External-Source [External] - https://github.com/gmh5225/immortal-rust > Game:Arma3 - https://github.com/Skengdo/arma3-external-variable-manager - https://github.com/R3voA3/3den-Enhanced [Mod Editor] - https://github.com/tym32167/arma3beclient [BattlEye Tool] > Game:7 Days To Die - https://github.com/IntelSDM/7DTD > Game:AVA - https://github.com/boylin0/AVA-Hack > Game:Mordhau - https://github.com/Skengdo/mordhau-simple-auto-block-cheat > Game:Smite [UE3] - https://github.com/JackBro/SmiteESPAimbot > Game:POLYGON [UE5] - https://github.com/gmh5225/POLYGON_UE5 > Game:PalWorld [UE5] - https://www.unknowncheats.me/forum/other-fps-games/620076-palworld-reversal-structs-offsets.html - https://github.com/gmh5225/Palworld-SDK-Dump - https://github.com/gmh5225/Palworld-Server-Modding - https://github.com/gmh5225/PalWorld-ServerInjector - https://github.com/gmh5225/PalWorld-NetCrack - https://github.com/luciouskami/palworld_rcon [Server on Windows] - https://github.com/luciouskami/palworld_rcon [Server on Windows] - https://github.com/A1RM4X/HowTo-Palworld [Server on Linux] - https://github.com/jammsen/docker-palworld-dedicated-server [Server based on Linux and Docker] - https://github.com/VeroFess/PalWorld-Server-Unoffical-Fix [Server patch] - https://github.com/NattKh/PalWorld-Tools [Mod Patcher] - https://github.com/localcc/PalworldModdingKit [A modding kit for Palworld] - https://github.com/weizhking/PalworldSaved [Save] - https://github.com/cheahjs/palworld-save-tools [Save] - https://github.com/EternalWraith/PalEdit Save] - https://github.com/DysonCheng/PalWorldSettingGenerator [Setting Generator] - https://github.com/hualuoo/palworld-helper [Helper] - https://github.com/shalzuth/PalWorldAntiCheat [Anti Cheat] - https://github.com/g91/PalAntiCheat-poc [Anti Cheat] > Game:Genshin Impact - https://github.com/khang06/mhynot2 - https://github.com/khang06/genshinjumpfixer2 [Decode CFG] - https://github.com/khang06/misc/tree/master/reversing/genshin [Decode CFG] - https://github.com/DNLINYJ/Anti_miHoYo_Jcc_Obfuscate [Decode CFG By X64DBG] - https://github.com/gmh5225/genshin-cheat - https://github.com/Grasscutters/Grasscutter [Private Server] - https://github.com/gmh5225/Genshin-Akebi-GC [Cheat] - https://github.com/gmh5225/Akebi-Cheat-3.3 [Cheat] - https://github.com/gmh5225/Genshin-GenshinData [Game Data] - https://github.com/HolographicHat/YaeAchievement - https://github.com/phonowell/genshin-impact-script [A sweet genshin impact script] - https://github.com/KnsGoyoLV/GenshinImpact-Base - https://github.com/360NENZ/Taiga74164-Akebi-GC - https://github.com/Ev3nt/EasyPeasy-GC - https://github.com/xTaiwanPingLord/GenshinDebuggerBypass - https://github.com/gmh5225/Genshin-EasyPeasy-Bypass [Anti-Debug Bypass] - https://github.com/ELJoOker2004/genshin-remove-banner - https://github.com/Micah123321/AutoOpenCAK [Bypass tool] - https://github.com/KillSKID/Genshin-Cheetos [Menu] > Game:Honkai Impact - https://github.com/BuIlDaLiBlE/BetterHI3Launcher - https://github.com/Z4ee/HI3-ACE-B > Game:Honkai Star Rail - https://github.com/Z4ee/StarRail-S-GC - https://github.com/Z4ee/StarRail-ACE-B - https://github.com/aderfa/star_rail - https://github.com/gmh5225/Pom-Pom - https://github.com/LmeSzinc/StarRailCopilot [Script] - https://github.com/CHNZYX/Auto_Simulated_Universe [Script] > Game:osu - https://github.com/fs-c/maniac [External] - https://github.com/Ciremun/freedom [difficulty changer & bot] - https://github.com/gmh5225/osu-aac [ANTI ANTI CHEAT] > Game:EldenRing - https://github.com/techiew/EldenRingMods [Mod] - https://github.com/v-maxson/EldenRingLauncher [Launcher] - https://github.com/Nordgaren/Elden-Ring-Debug-Tool [Debug tool for Elden Ring modding] > Game:Dark Souls - https://github.com/igromanru/Dark-Souls-III-Cheat-Engine-Guide > Game:Sea Of Thieves - https://github.com/ToxSylph/SeaOfChoros > Game:GTA III - Definitive Edition - https://github.com/gmh5225/GTAIII-DE-GoldHook > Game:GTA5 - https://github.com/P0L3NARUBA/gtav-sourcecode-build-guide [GTA V Source Code Build Tutorial] - https://github.com/gmh5225/GTA-5-SIGS-1.59 [Offset] - [About Adds drag- to- resize functionality to the main GTA V window](https://github.com/CamxxCore/GTAV_DragResize) - [Open-source cheat software for Grand Theft Auto V (PC)](https://github.com/gmh5225/GrandTheftAutoV-Cheat) - https://github.com/Pocakking/BigBaseV2 - https://github.com/YimMenu/YimMenu - https://github.com/Seanghost117/SpookiMystic-GTA-Leak [Menu] - https://github.com/Rimmuru/gta-source - https://github.com/SyDevTeam/gta5view [Viewer/Editor] - https://github.com/skarockoi/pHake [Mod Menu] - https://github.com/CamxxCore/ExtendedCameraSettings [Extending functionality of the gameplay camera] - https://github.com/medusi/gta5cheat - https://github.com/ssyatelandisi/gta5cheat_qt > Game:Geometry Dash - https://github.com/reservedcloud/gd-internal > Game:8ball pool - https://github.com/gmh5225/Alaa-8ball-pool-source-exposed > Game:Wizard101 - https://github.com/AmJayden/wizard101-spoofer [HWID] > Game:QQTang - https://github.com/blackmaple/QQTangCheatEngine > Game:Chess - https://github.com/LeelaChessZero/lc0 [Chess Engine] - https://github.com/official-stockfish/Stockfish [Chess Engine] > Game:BLOCKPOST - https://github.com/xo1337/BLOCKPOST-Cheat > Game:Witch It - https://github.com/guttir14/CheatIt > Game:RO - https://github.com/rAthenaCN/rAthenaCN > Game:PokemonGo - https://github.com/Jumboperson/PokemonGoDumper > Game:L4D2 - https://github.com/Fox-Cult/L4D2-Cheat [Linux] - https://github.com/Axactt/L4D2Basic > Game:mhxy - https://github.com/gmh5225/mhxy_kernel - https://github.com/gmh5225/mhxy > Game:Ironsight - https://github.com/oluan/Lazysight > Game:Devour - https://github.com/ALittlePatate/DevourClient - https://github.com/BitCrackers/DevourMenu [Menu] > Game:Goose Goose Duck - https://github.com/Liuhaixv/Goose_Goose_Duck_Hack > Game:Team Fortress 2 - https://github.com/gmh5225/teamfortress2_internal - https://github.com/BlueSnoopT/Cunthook [linux] - https://github.com/Fedoraware/Fedoraware ## Anti Cheat > Guide - https://technology.riotgames.com/news/riots-approach-anti-cheat - https://github.com/87andrewh/WeirdAntiCheatIdeas - https://github.com/gmh5225/AntiCheat-chrysalis - https://www.unknowncheats.me/forum/anti-cheat-bypass/481731-tutorial-ring3-anticheat-project.html - https://github.com/dhondta/awesome-executable-packing [Executable File Packing] - https://anti-debug.checkpoint.com [Anti Debug] - https://github.com/DenuvoSoftwareSolutions/DVRT [DVRT] - https://areweanticheatyet.com [A list of games using anti-cheats] - https://github.com/MyHwu9508/alt-V-Anticheat-Guide [GTA5 MP servers] - https://github.com/frank2/packer-tutorial [Packer] - https://github.com/kid-gorgeous/ghostbusters [Senior Design: Anit-Cheat Detection system] > Stress Testing - https://github.com/niemand-sec/AntiCheat-Testing-Framework [Testing Framework] - https://github.com/gmh5225/MemWars [Testing Framework] - https://github.com/ekknod/EC [Testing Framework] - https://github.com/stuxnet147/Known-Driver-Mappers [Known Driver Mappers] - https://github.com/DanielRTeixeira/injectAllTheThings [Injection Testing] - https://github.com/MahmoudZohdy/Process-Injection-Techniques [Injection Testing] - https://github.com/zoand/Injectors [Injection Testing] - https://github.com/guided-hacking/GuidedHacking-Injector [Injection Testing] - https://github.com/gmh5225/rust-dll-crab [Injection Testing] - https://github.com/odzhan/injection [Injection Testing] - https://github.com/w1u0u1/kinject [Injection Testing] - https://github.com/D4stiny/ThreadJect [Injection Testing] - https://github.com/KooroshRZ/Windows-DLL-Injector [Injection Testing] - https://github.com/Fahersto/code_injection [Injection Testing] - https://github.com/deepinstinct/Dirty-Vanity [Injection Testing:RtlCreateProcessReflection] - https://github.com/NullTerminatorr/ThreadHijackingInjector [Injection Testing] - https://github.com/Skengdo/simple-SetWindowsHookExW-injector [Injection Testing:SetWindowsHookExW] - https://github.com/gmh5225/SetWindowsHookEx-Injector [Injection Testing:SetWindowsHookExW] - https://github.com/FULLSHADE/Jektor [Injection/Shellcode Testing] - https://github.com/KANKOSHEV/face-injector-v2 [Injection/ Testing] - https://github.com/notscimmy/libelevate [Elevating Handle] - https://github.com/ZoondEngine/NoBastian_v2 [Elevating Handle By LSASS] - https://github.com/Ricardonacif/launcher-abuser [Elevating Handle] - https://github.com/ContionMig/LSASS-Usermode-Bypass [Elevating Handle By LSASS] - https://github.com/gmh5225/LSASS-DumpThatLSASS [Elevating Handle By LSASS] - https://github.com/kkent030315/Van1338 [Elevating Handle By Timing Attack] - https://github.com/gmh5225/Handle-Ripper [DuplicateHandle] - https://github.com/Kudaes/Dumpy [Reuse opened handles By LSASS] - https://github.com/zorftw/lsass-extend-mapper [Manual mapper from LSASS] - https://github.com/Mattiwatti/EfiGuard [PG Testing] - https://github.com/9176324/Shark [PG Testing] - https://github.com/gmh5225/HideDriverTesting [Hide Driver Testing] - https://github.com/nbqofficial/HideDriver [Hide Driver Testing] - https://github.com/ExpLife0011/HideDriver [Hide Driver Testing] - https://github.com/BadPlayer555/TraceCleaner [Hide Driver Testing] - https://github.com/muturikaranja/disable-threat-tracing [ETW Testing] - https://github.com/Mr-Un1k0d3r/AMSI-ETW-Patch [ETW Testing] - [EDRSandblast/KernellandBypass/ETWThreatIntel.c](https://github.com/wavestone-cdt/EDRSandblast/blob/master/EDRSandblast/KernellandBypass/ETWThreatIntel.c) [ETW Testing] - https://github.com/daswareinfach/Battleye-VAC-EAC-Kernel-Bypass [FsFilter Testing] - https://github.com/aahmad097/MMFCodeInjection [User APC + File Mapping Testing] - https://github.com/liors619/TtdAntiDebugging [Debug Testing] - https://github.com/gmh5225/cheat-attack-thread-slemu [Hearbeat Testing] - https://github.com/nkga/cheat-driver [MmCopyVirtualMemory Testing] - https://github.com/zxd1994/vt-debuuger [Hacked Hypervisor Testing] - https://github.com/3526779568/vt-debuger [Hacked Hypervisor Testing] - https://github.com/MellowNight/AetherVisor [Hacked Hypervisor Testing AMD] - https://github.com/rbmm/LockFile-Poc [Lock File] - https://github.com/gmh5225/UltraDriver-Game-Cheat [Cheat Driver] - https://github.com/gmh5225/Kernel-Special-APC-ReadProcessMemory [RPM] > Driver Unit Test Framework - https://github.com/wpdk/wdutf > Anti Debugging - https://github.com/LordNoteworthy/al-khaser - https://github.com/hfiref0x/WubbabooMark - https://github.com/samshine/ScyllaHideDetector2 - https://github.com/revsic/AntiDebugging - https://github.com/Ahora57/MAJESTY-technologies - https://github.com/AdvDebug/AntiCrack-DotNet [CSharp] - https://github.com/weak1337/CEDetector [CE] - https://github.com/gmh5225/Detection-CheatEngine [CE] - https://github.com/gmh5225/AntiDbg-AmogusPlugin - https://gtoad.github.io/2017/06/25/Android-Anti-Debug [Android] - https://github.com/polaryy/AntiDebugandMemoryDump [Android] - https://github.com/fiord/ADB-Debug-Detect-Checker [Android] - [Sample anti-debug with detect ScyllaHide/HyperHide and TitanHide](https://github.com/gmh5225/antidbg-Baka) - [Linux anti-debugging techniques](https://github.com/hiatus/adbg) - https://github.com/HackOvert/AntiDBG - https://github.com/BarakAharoni/LADD [Linux] - https://github.com/0xor0ne/debugoff [Linux] - https://github.com/gmh5225/AntiKernelDebug-POC [Windows Kernel] - https://github.com/BaumFX/cpp-anti-debug - https://github.com/Metick/Anti-Debug - https://github.com/Ahora57/RaceCondition - https://github.com/AdvDebug/AntiCrack-DotNet [DotNet] - https://github.com/hotline1337/umium [C++/CLI] - https://github.com/YouNeverKnow00/Anti-Debugger-Protector-Loader - https://github.com/CheckPointSW/showstopper - https://github.com/secrary/makin [Reveal anti-debugging and anti-VM tricks] > Page Protection - https://github.com/changeofpace/Self-Remapping-Code - https://github.com/ReFo0/anti-crack-system - https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-addsecurememorycachecallback - https://github.com/weak1337/NO_ACCESS_Protection - https://github.com/noff2k/no-access-protection-x86 - https://github.com/hotline1337/page_no_access - https://github.com/thefLink/DeepSleep - https://github.com/janoglezcampos/DeathSleep - https://github.com/gmh5225/Sleep-obf-T.D.P. - https://github.com/mgeeky/ShellcodeFluctuation - https://github.com/Gofrettin/veh-printf-hook [VEH + PAGE_GUARD] - https://github.com/charliewolfe/PointerGuard [VEH + PAGE_GUARD] - https://github.com/connormcgarr/EATGuard [VEH + PAGE_GUARD] - https://github.com/gmh5225/MemoryGuard [VEH + PAGE_GUARD] - https://github.com/ilovecsad/veh_hide_memory [VEH + PAGE_NOACCESS] - https://github.com/gmh5225/PAGE_NO_ACCESS-not-byfron [VEH + PAGE_NOACCESS] - https://github.com/saveme712/BinCon [VEH + PAGE_NOACCESS] > Binary Packer - https://github.com/dhondta/awesome-executable-packing - https://github.com/phra/PEzor - https://github.com/czs108/PE-Packer [X86] - https://github.com/longqun/Packer [X86] - https://github.com/ATsahikian/pe-protector [X86] - https://github.com/mkaring/ConfuserEx [.NET] - https://github.com/iArtorias/debug_remover [Strip Debug Info] - https://github.com/ytk2128/pe32-password - https://github.com/frkngksl/Huan - https://github.com/frkngksl/HintInject [Hint/Name Table] - https://github.com/ClaudiuGeorgiu/Obfuscapk [Android] - https://github.com/magnussen7/Embuche [ELF] - https://github.com/EgeBalci/amber - https://github.com/SamLarenN/PePacker - https://github.com/Systemcluster/wrappe [Rust] - https://github.com/vsteffen/woody_woodpacker [ELF] - https://github.com/n4sm/m0dern_p4cker [ELF] - https://github.com/JonDoNym/peinjector - https://github.com/craids/AresFramework - https://github.com/andrew9382/exe_packer - https://github.com/dr4k0nia/Origami [Compressing .net assemblies] - https://github.com/mix64/ELFpacker [ELF] - https://github.com/jnastarot/shibari [Linking multiple PE\PE + files to one] - [Simple ELF runtime packer for creating stealthy droppers](https://github.com/ex0dus-0x/ward) - [A simple packer working with all PE files which cipher your exe with a XOR implementation](https://github.com/nqntmqmqmb/xorPacker) - https://github.com/r0ngwe1/petoy [PE] - [An ELF / PE packer written in pure C](https://github.com/SilentVoid13/Silent_Packer) - https://github.com/droberson/ELFcrypt [ELF RC4] - https://github.com/timhsutw/elfuck [ELF] - https://github.com/Eronana/packer [PE] - https://github.com/akuafif/hXOR-Packer [PE XOR] - https://github.com/arisada/midgetpack [ELF] - https://github.com/friedkiwi/netcrypt [.NET] - https://github.com/89luca89/pakkero [ELF] - https://github.com/dimkr/papaw [LZMA] - https://github.com/akawashiro/sloader [ELF loader which aims to replace ld-linux.so of glibc] - https://github.com/MahmoudZohdy/IAT-Obfuscation [IAT Obfuscation] - https://github.com/gmh5225/shellcode-EntropyFix [Reducing entropy] - https://github.com/ORCx41/AtomPePacker [PE X64] - https://github.com/Lima-X/Win32.Nebula [PE X64] - https://github.com/TheAenema/hm-pe-packer [PE X64] - https://github.com/hid3rx/PEPacker [PE X64] - https://github.com/xsj3n/x64-EXE-Packer [PE X64] - https://github.com/frkngksl/Shoggoth [Polymorphic Encryptor] - https://github.com/GunshipPenguin/kiteshield [ELF X64] - https://github.com/cff0x/KitsuPE [PE] - https://github.com/KooroshRZ/Evader [PE] - https://github.com/greyb1t/GreyM [PE] - https://github.com/DavidBuchanan314/stelf-loader [ELF X64 loader] - https://github.com/frank2/oxide [Written by Rust] - https://github.com/Washi1337/AwaitFuscator [.NET] > CLR Protection - https://github.com/endgameinc/ClrGuard > Anti Disassembly - https://github.com/rrbranco/blackhat2012 > Sample Unpacker - https://github.com/hasherezade/mal_unpack_drv - https://github.com/strazzere/android-unpacker [Android] > Dump Fix - https://github.com/t3ssellate/unmapper - https://github.com/d35ha/DumpPE - https://github.com/pr701/fix-arxan > Encrypt Variable - https://github.com/serge-14/encrypted_value [C++] - https://github.com/momalab/e3 [C++] - https://github.com/obama-gaming/xor-float [C++] - https://github.com/emlinhax/xv [C++] > Lazy Importer - https://github.com/JustasMasiulis/lazy_importer - https://github.com/hypervisor/kli - https://github.com/gmh5225/kli-ex - https://github.com/1hAck-0/zeroimport - https://github.com/emlinhax/blitz > Shellcode Engine & Tricks - https://github.com/jseclab/obj2shellcode - https://github.com/lainswork/shellcode-factory - https://github.com/H1d3r/GPU_ShellCode [hide the payload inside the gpu memory] > Obfuscation Engine - https://github.com/vi3t1/vmprotect-3.5.1 - https://github.com/mike1k/perses - https://github.com/weak1337/Alcatraz - https://github.com/FigmaFan/Alcatraz - https://github.com/es3n1n/obfuscator - https://github.com/jnastarot/furikuri - https://github.com/nickcano/RelocBonus [Attack Reloc] - https://github.com/maoabc/nmmp [Dex] - https://github.com/CodingGay/BlackObfuscator [Dex] - https://github.com/d35ha/CallObfuscator [Call Obfuscation] - https://github.com/nelfo/Milfuscator - https://github.com/romainthomas/the-poor-mans-obfuscator [elf/macho] - https://github.com/Guardsquare/proguard [Java] - https://github.com/xiaoweime/WProtect - https://github.com/DeDf/WProtect - https://github.com/jokerNi/WProtectSDK - https://github.com/cxxrev0to1dev/nb_obfuscator - https://github.com/gmh5225/cerberus [VM] - https://github.com/layerfsd/phantasm-x86-virtualizer [VM] - https://github.com/felix-rs/guardian-rs [VM] - https://github.com/CalebFenton/simplify [Java] - https://github.com/open-obfuscator/dProtect [Java/Kotlin] - https://github.com/Maldev-Academy/EntropyReducer [Reduce Entropy] - https://github.com/Washi1337/AwaitFuscator [.NET] > Screenshot - https://github.com/bavulapati/DXGICaptureApplication [Capture Desktop] - https://github.com/Rick-laboratory/Windows-Screenshotcapture-DirectX/blob/master/main.cpp [DX9] - https://github.com/lainswork/dwm-screen-shot [DWM] - https://github.com/kirides/screencapture [DX11] - https://github.com/bmharper/WindowsDesktopDuplicationSample [DXGI] - https://github.com/PierreCiholas/GetPixel-vs-BitBlt_GetDIBits [GetPixel] - https://github.com/gmh5225/ScreenShot [BitBlt] > Game Engine Protection:Unreal - https://github.com/zompi2/Static-Variables-Obfuscator-UE4 - https://github.com/gmh5225/UE-Plugin-SCUE4-Plugin - https://github.com/gmh5225/UnrealEngine-Protection > Game Engine Protection:Unity - https://github.com/ls9512/USecurity - https://github.com/bmjoy/Unity3D_Obfuscator - https://github.com/Ether2023/Ether-Uprotector > Game Engine Protection:Source - [Source Engine serverside anti-cheat plugin. (CS:S, CS:GO, CS:P, TF2)](https://github.com/kanekikun420/NoCheatZ-3) > Open Source Anti Cheat System - https://github.com/mq1n/NoMercy - https://github.com/NoMercy-ac [NoMercy] - https://github.com/JackBro/BetaShield - https://github.com/chztbby/RebirthGuard - https://github.com/GravitLauncher/Avanguard - https://github.com/Rycooop/Bloom-Anticheat - https://github.com/Vasieco/Kernel-Anticheat [Kernel Anticheat] - https://github.com/AvivShabtay/Stresser [Anti Virus in fact but also Anti Cheat] - https://github.com/gmh5225/antivirus [Anti Virus in fact but also Anti Cheat] - https://github.com/D4stiny/PeaceMaker [Anti Virus in fact but also Anti Cheat] - https://github.com/danielkrupinski/VAC [Reversed VAC] - https://github.com/ApexLegendsUC/anti-cheat-emulator - https://github.com/ch4ncellor/EAC-Reversal [Reversed EAC] - https://github.com/weak1337/BE-Shellcode [Reversed BE Shellcode] - https://github.com/SamuelTulach/be_shellcode_dump [Reversed BE Shellcode] - https://github.com/codetronik/AndroidAntiCheat [Android Platform] - https://github.com/Lazenca/Lazenca-S [Android Platform] - https://github.com/MrDiamond64/Scythe-AntiCheat [Minecraft] - https://github.com/GrimAnticheat/Grim [Minecraft] - https://github.com/mateusreb/AntiCheat - https://github.com/ComodoSecurity/openedr [EDR] - https://github.com/0xrawsec/whids [EDR] - https://github.com/Neo23x0/Raccine [EDR] - https://github.com/ION28/BLUESPAWN [EDR] - https://github.com/TheHive-Project/TheHive [EDR] - https://github.com/wazuh/wazuh [XDR] - https://github.com/AlSch092/UltimateAntiCheat - https://github.com/JonathanBerkeley/Quack - [Source Engine serverside anti-cheat plugin. (CS:S, CS:GO, CS:P, TF2)](https://github.com/kanekikun420/NoCheatZ-3) - [This is the Anti Cheat System for Knight Online Gamesoft vversion](https://github.com/luisfelipe18/GamesoftACS) - [User-mode C++ Anti-Cheat written for German Roleplay Server GVMP.de](https://github.com/divodeuxsevres/gvmp-anticheat) - [Cheat developer platform](https://github.com/c4kef/UAC) - https://github.com/ekknod/Anti-Cheat-TestBench [TestBench] - https://github.com/gmh5225/Malicious-code-detection-bugu [Malicious code detection and obfuscation] - [Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System](https://github.com/PI-Defender/pi-defender) - https://github.com/gmh5225/Anticheat-android-cheap-engine [Sample implementation of anti-cheat in android] - [Proof of concept Anti-Cheat plugin for CS:GO](https://github.com/ekknod/CSGO-AC) - [Deep Learning Anti-Cheat For CSGO](https://github.com/LaihoE/DLAC) - [Deep Learning Anti-Cheat For CSGO](https://github.com/bananya-ml/anti-cheat) - https://github.com/jnastarot/anti-cheat - https://github.com/jnastarot/ice9 - https://github.com/realTristan/Reborn [Designed with Rust] - https://github.com/dllcrt0/Dynsec - https://github.com/XZNX5/Basic_Anti-Cheat - https://github.com/MegaAntiCheat - https://github.com/donnaskiez/ac - https://github.com/gmh5225/AcDrv - https://github.com/sc-222/Mandragora [For Assault Cube] - https://github.com/J-Tanzanite/Little-Anti-Cheat [For Source Games] > Analysis Framework - https://github.com/pandora-analysis/pandora > Detection:Hook - https://github.com/hasherezade/pe-sieve - https://github.com/mike1k/HookHunter - https://github.com/st4ckh0und/hook-buster - https://github.com/gmh5225/Driver-Detect-nullshit - https://github.com/paranoidninja/EtwTi-Syscall-Hook [Instrumentation Callback] - https://github.com/Luchinkin/device-control-hooks-scanner [device-control-hooks-scanner] - https://github.com/ORCx41/KnownDllUnhook [Replace the .txt section of the current loaded modules from \KnownDlls\] > Detection:Memory Integrity - https://github.com/afulsamet/integrity - https://github.com/Midi12/QueryWorkingSetExample - https://github.com/Deputation/integrity_experiments [header only] > Detection:ShellCode - https://github.com/jdu2600/EtwTi-FluctuationMonitor [ETW] - https://github.com/jdu2600/Etw-SyscallMonitor [ETW] - https://github.com/jdu2600/CFG-FindHiddenShellcode [CFG] > Detection:Attach - https://github.com/KANKOSHEV/Detect-KeAttachProcess > Detection:Triggerbot & Aimbot - https://github.com/KANKOSHEV/Detect-MouseClassServiceCallback - https://github.com/changeofpace/MouHidInputHook - https://github.com/KelvinMsft/UsbMon - https://github.com/87andrewh/DeepAimDetector [Deep Learning] - https://github.com/waldo-vision/waldo [Deep Learning] - https://github.com/waldo-vision/aimbot-detection-prototype [Deep Learning] - https://github.com/bananya-ml/anti-cheat [Deep Learning for CSGO] - https://github.com/hkx3upper/Karlann [Keyboard] - https://github.com/Oliver-1-1/MouseDetection [Mouse] - https://github.com/Oliver-1-1/EtwKeyboardDetection [ETW] > Detection:Hide - https://github.com/KANKOSHEV/Detect-HiddenThread-via-KPRCB - https://github.com/ekknod/Anti-Cheat-TestBench [KPRCB+PTE] - https://github.com/weak1337/SystemThreadFinder - https://github.com/mq1n/HiddenModuleDetector - https://github.com/KelvinMsft/ThreadSpy - https://github.com/Rwkeith/Nomad [Mapped Driver] - https://github.com/Nou4r/ModFinder [Mapped Dll] - https://github.com/1401199262/NMIStackWalk [Mapped Driver by NMI Callback] - https://github.com/donnaskiez/nmi-callback-handler [Mapped Driver by NMI Callback] - https://github.com/gmh5225/Kernel_Anti-Cheat [NMI] - https://github.com/jafarlihi/modreveal [Find hidden Linux kernel modules] - https://github.com/gmh5225/Hidden-Thread-Finder [Detect hidden threads] - https://github.com/gmh5225/StealthSytemThreadFinderBE [Detect hidden threads] - https://github.com/eversinc33/unKover [Using NMI/APC to detect mapped drivers] - https://github.com/gmh5225/Rootkit-2 [Using CsrRootProcess to detect hidden process] > Detection:Vulnerable Driver - https://github.com/Deputation/hygieia - https://github.com/FaEryICE/MemScanner > Detection:EFI Driver - https://github.com/gmh5225/Detect-EFIGuard > Detection: Hacked Hypervisor - https://secret.club/2020/04/13/how-anti-cheats-detect-system-emulation.html - https://github.com/helloobaby/Nmi-Callback [NMI Callback] - https://github.com/momo5502/ept-hook-detection [Detect EPT] - https://github.com/gmh5225/Detect-Hypervisor_detect_ring_0 - https://github.com/jonomango/nohv - https://github.com/void-stack/Hypervisor-Detection > Detection:Virtual Environments - https://github.com/a0rtega/pafish - https://github.com/gmh5225/Detection-Hyper-v [Hyper-v] - https://github.com/Ahora57/MAJESTY-technologies - https://github.com/therealdreg/anticuckoo [Cuckoo] - https://github.com/strazzere/anti-emulator [Android Anti-Emulator] - https://github.com/gmh5225/Android-Emulator-Detection [Android Anti-Emulator] - https://github.com/reveny/Android-Emulator-Detection [Android Anti-Emulator] - https://github.com/LloydLabs/wsb-detect [Windows Sandbox ("WSB")] - https://github.com/DevDaveid/AntiDebug-AntiVM [Vbox] - https://github.com/LukeGoule/compact_vm_detector - https://github.com/kernelwernel/VMAware [VM detection library] - https://github.com/su-vikas/conbeerlib [Android library for detecting Android virtual containers] > Detection:HWID - [All methods of retrieving unique identifiers(HWIDs) on your PC](https://www.unknowncheats.me/forum/anti-cheat-bypass/333662-methods-retrieving-unique-identifiers-hwids-pc.html) - https://github.com/medievalghoul/hwid-checker-mg - https://github.com/weak1337/NvidiaApi - https://github.com/paradoxwastaken/WindowsHardwareInfo - https://github.com/lavoiesl/osx-cpu-temp [CPU temperature for OSX] - https://github.com/ashleyhung/WinRing0 [CPU temperature for windows] - https://github.com/openhardwaremonitor/openhardwaremonitor - https://github.com/LibreHardwareMonitor/LibreHardwareMonitor - https://github.com/lfreist/hwinfo - https://github.com/KDIo3/PCIBan - https://github.com/trustdecision/trustdevice-android [Android] - https://github.com/trustdecision/trustdevice-ios [IOS] > Detection:SpeedHack - https://github.com/DoranekoSystems/cheap-engine [Android] > Detection:Injection - https://github.com/mq1n/DLLThreadInjectionDetector - https://github.com/Nou4r/ModFinder [Mapped Dll] - https://github.com/gmh5225/Driver-WatchOwl [ImageNotify+Stack Trace] - https://github.com/xuanxuan0/TiEtwAgent [ETW] > Detection:Spoof Stack - https://github.com/gabriellandau/ShadowStackWalk > Detection:ESP - https://github.com/weak1337/PresentHookDetection > Detection:DMA - https://github.com/gmh5225/DmaProtect [VT-d/IOMMU] - https://github.com/iqrw0/DieDMAProtection [IOMMU] > Detection:Wall Hack - https://github.com/87andrewh/CornerCulling - https://github.com/87andrewh/CornerCullingSourceEngine > Detection:Obfuscation - https://github.com/mrphrazer/obfuscation_detection > Detection:Android root - https://github.com/rushiranpise/detection [Collection of Various Root Detection Apps for Android] - https://github.com/vvb2060/KeyAttestation [Bootloader] > Detection:Magisk - https://github.com/vvb2060/MagiskDetector - https://github.com/canyie/MagiskKiller - https://github.com/Dr-TSNG/ApplistDetector - https://github.com/apkunpacker/MagiskDetection > Detection:Frida - https://github.com/darvincisec/DetectFrida - https://github.com/qtfreet00/AntiFrida - https://github.com/muellerberndt/frida-detection - https://github.com/apkunpacker/Anti-Frida [Some Of Anti-Frida Stuff] > Detection:Overlay - https://github.com/geeksonsecurity/android-overlay-protection [Android] > Signature Scanning - https://github.com/c3rb3ru5d3d53c/binlex - https://github.com/mischasan/aho-corasick > Information System & Forensics - https://github.com/Enum0x539/Qvoid-Token-Grabber - https://github.com/travisfoley/dfirtriage - https://github.com/AlessandroZ/LaZagne - https://github.com/thewhiteninja/ntfstool - https://github.com/mgeeky/ntfs-journal-viewer - https://github.com/volatilityfoundation/volatility - https://github.com/volatilityfoundation/volatility3 - [Decrypt and export browser password, including Chromium,Edge and Firefox](https://github.com/BL0odz/BrowserPasswordExportor) - https://github.com/gtworek/VolatileDataCollector - https://github.com/mubix/netview - https://github.com/rbmm/USN - https://github.com/rbmm/SearchEx - https://github.com/ch3rn0byl/ANTfs - https://github.com/strozfriedberg/ntfs-linker - https://github.com/NTFSparse/ntfs_parse - https://github.com/bluecapesecurity/PWF [Windows Forensics Training] - https://github.com/qwqdanchun/Pillager [For exporting and decrypting useful data from target computer] - https://github.com/Psmths/windows-forensic-artifacts [Guide to the various Windows forensic artifacts] - https://github.com/rabbitstack/fibratus [Windows kernel exploration and tracing] - https://github.com/google/grr [remote live forensics] - https://github.com/MrMugiwara/FTK-imager-OSX [Forensics Tools For MAC OS X] - https://github.com/h4sh5/DumpIt-mirror [DumpIt for windows] - https://github.com/MagnetForensics/dumpit-linux [DumpIt for linux] > Dynamic Script - https://github.com/can1357/NtLua - https://github.com/mrexodia/NtPhp - https://github.com/FastVM/minivm - https://github.com/jnz/q3vm > Kernel Mode Winsock - https://github.com/MiroKaku/libwsk [Kernel-Mode Winsock library] > Fuzzer - https://github.com/0vercl0k/wtf > OpenCV - https://github.com/YouNeverKnow00/Rust-Auto-Weapon-Detection-OpenCV-Example > Windows Ring3 Callback - https://github.com/aahmad097/AlternativeShellcodeExec - https://github.com/RixedLabs/IDLE-Abuse - https://github.com/Wra7h/FlavorTown - https://github.com/Deputation/instrumentation_callbacks [Instrumentation Callback] - https://github.com/R4YVEN/beservice_intcallbacks [Instrumentation Callback] - https://github.com/secrary/Hooking-via-InstrumentationCallback [Instrumentation Callback] - https://github.com/paranoidninja/EtwTi-Syscall-Hook [Instrumentation Callback] - https://github.com/jackullrich/syscall-detect [Instrumentation Callback] - https://github.com/thetuh/anticheat-poc [Instrumentation Callback] - https://github.com/1027565/InstrumentationCallbacks [Instrumentation Callback] - [Register VEH by hooking RtlpCallVectoredHandlers](https://github.com/AmJayden/custom-VEH) - [ATPMiniDump Callback](https://github.com/b4rtik/ATPMiniDump) - https://github.com/jimbeveridge/readdirectorychanges [ReadDirectoryChangesW] - https://github.com/blaquee/dllnotif [DllNotification] - https://github.com/gmh5225/LdrRegisterDllNotification-modify-testing [DllNotification] > Windows Ring0 Callback - https://github.com/gmh5225/kernel-callback-functions-list [Callback List] - [Enumerate Callback](https://github.com/hfiref0x/WinObjEx64/blob/7284d711b2eeebfd965713fc79353b9b76e23083/Source/WinObjEx64/extras/extrasCallbacks.c#L117) - [ImageNotify Callback With RtlWalkFrameChain](https://github.com/Staatsgeheim/PsImageNotifyRoutineSpamFilter) - [SymlinkCallback](https://github.com/yardenshafir/SymlinkCallback) > Winows User Dump Analysis - https://github.com/0vercl0k/udmp-parser > Winows Kernel Dump Analysis - https://github.com/gmh5225/Tool-DIYSystemMemoryDump [DIY Dump Type] - https://github.com/0vercl0k/kdmp-parser [Python 3 bindings] - https://github.com/mrexodia/dumpulator [Emulating code in minidump files] - https://github.com/0vercl0k/symbolizer [Execution trace symbolizer] - https://github.com/libyal/libmdmp [Minidump] - https://github.com/tasox/miniDumpReader [Minidump] > Sign Tools - https://github.com/mtrojnar/osslsigncode - https://github.com/gmh5225/chainoffools [CVE] - https://github.com/mattifestation/WDACTools [Decrypt p7b] - https://github.com/utoni/PastDSE [Sign Leaked Cert] - https://github.com/Jemmy1228/HookSigntool [Sign Leaked Cert] - https://github.com/namazso/MagicSigner [Sign Leaked Cert] - https://github.com/hzqst/FuckCertVerifyTimeValidity [Sign Leaked Cert] - https://github.com/mathisvickie/sign-expired [Sign Leaked Cert] - https://github.com/hackerhouse-opensource/SignToolEx [Sign Leaked Cert] > Backup File - https://github.com/guidoreina/minivers [Generates Backup Copies] > Backup Drivers - https://github.com/gloriouslegacy/ezDrvBAK [Backup & restrore the Windows-Drivers] > Black Signature - https://github.com/gmh5225/BlackSignatureDriver - https://github.com/jsecurity101/MSFT_DriverBlockList - https://github.com/Harvester57/CodeIntegrity-DriverBlocklist - https://github.com/gmh5225/MS-Vulnerable-Driver-List [Convert Microsoft's blocklist to a hash list] ## Some Tricks > Windows Ring0 - https://www.unknowncheats.me/forum/general-programming-and-reversing/495279-messagebox-kernel-mode.html [Msgbox] - https://back.engineering/01/12/2020/ [Page Table Manipulation] - https://git.back.engineering/_xeroxz/PSKP [PTE Hook] - https://github.com/Rythorndoran/PageTableHook [PTE Hook] - https://github.com/stdhu/windows-kernel-pagehook [PTE Hook] - https://github.com/Xyrem/Yumekage [PTE Hook] - https://github.com/Compiled-Code/be-injector [Attack COW] - https://github.com/Compiled-Code/eac-mapper [Vulnerable MmCopyMemory] - https://github.com/EBalloon/MmCopyMemory [Bypass MmCopyMemory] - https://github.com/Compiled-Code/be-injector [Attack COW] - https://github.com/gmh5225/Allocating-individual-pages [MmAllocateIndependentPagesEx] - https://github.com/gmh5225/Hook-HvlSwitchVirtualAddressSpace [HvcallCodeVa] - https://github.com/1401199262/HookHvcallCodeVa [HvcallCodeVa] - https://github.com/gmh5225/Driver-HypercallPageHook [HvcallCodeVa] - https://github.com/Xyrem/HyperDeceit [HvcallCodeVa] - https://github.com/gmh5225/CallMeWin32kDriver [Load your driver like win32k.sys] - https://github.com/gmh5225/DSEDodge-Signed-Kernel-Driver [Leveraging PTT to defeat DSE] - https://github.com/wbenny/KSOCKET [Kernel Berkeley socket] - https://github.com/StephanvanSchaik/windows-kernel-rs [Writing Windows kernel drivers in Rust] - https://github.com/ekknod/smm [Smm cheat] - https://github.com/rbmm/KPDB [Parsing PDB in Driver] - https://github.com/GetRektBoy724/KPDB [Parsing PDB in Driver] - https://github.com/gmh5225/FakeEnclave [A poc that abuses Enclave] - https://github.com/gmh5225/LetMeGG [A POC about how to prevent windbg break] - https://github.com/UCFoxi/NotifyRoutineHijackThread [Hijack PspCreateThreadNotifyRoutine] - [GetWindowName In Kernel Mode](https://www.unknowncheats.me/forum/anti-cheat-bypass/517022-getwindowname-kernel-mode.html) - [GetWindowInfo In Kernel Mode](https://www.unknowncheats.me/forum/anti-cheat-bypass/519261-getwindowinfo.html) - [Hook KdTrap(Windows global exception hander)](https://www.unknowncheats.me/forum/anti-cheat-bypass/500156-hook-kdtrap-windows-global-exception-hander.html) [Hook KdTrap] - https://github.com/gmh5225/Hook-KdTrap [Hook KdTrap] - https://github.com/gmh5225/AcDrv [Global exception/KdpDebugRoutineSelect] - https://github.com/gmh5225/AcDrv [SwapContext hook] - https://github.com/gmh5225/Driver-SoulExtraction [Extracting cert information] - https://github.com/Ido-Moshe-Github/CiDllDemo [Use ci.dll API for validating Authenticode signature of files] - https://github.com/mihaly044/pedigest [Calculating the authenticode digest] - https://github.com/gmh5225/Kernel-Special-APC-ReadProcessMemory [Kernel APC RPM] - https://github.com/NSG650/Bad-BugCheck-Old [BSOD] - https://github.com/NSG650/Bad-Bugcheck [BSOD] - https://github.com/NSG650/NoMoreBugCheck [BSOD] - https://github.com/NSG650/BugCheckHack [BSOD] - https://github.com/NSG650/BugCheck2Linux [BSOD] - https://github.com/AnalogFeelings/KmdfMandelcheck [BSOD] - https://github.com/stuxnet147/PiDqSerializationWrite-Example [PiDqSerializationWrite] - https://github.com/Rythorndoran/enum_real_dirbase [Find real dirbase] - https://github.com/backengineering/POC-ExFlushTb [A POC for monitoring Tb] - https://github.com/Cr4sh/KernelForge [A library to develop kernel level Windows payloads for post HVCI era] - https://gist.github.com/gmh5225/ab00f831ffdf4ef608ab3b6eb0d37250 [Create process from KernelMode via APC] - https://github.com/gmh5225/Map-file-in-system-space [MiMapViewInSystemSpace] - https://github.com/SamuelTulach/PwnedBoot [Using Windows' own bootloader as a shim to bypass Secure Boot] > Windows Ring3 - https://secret.club/2021/01/04/thread-stuff.html [Anti Debug] - https://github.com/utoni/PastDSE [Sign Leaked Cert] - https://github.com/Jemmy1228/HookSigntool [Sign Leaked Cert] - https://github.com/namazso/MagicSigner [Sign Leaked Cert] - https://github.com/hzqst/FuckCertVerifyTimeValidity [Sign Leaked Cert] - https://github.com/mathisvickie/sign-expired [Sign Leaked Cert] - https://github.com/Sentient111/StealingSignatures [Stealing signatures from pe files] - https://github.com/secretsquirrel/SigThief [Stealing signatures from pe files] - https://github.com/jfmaes/LazySign [Fake Cert] - https://github.com/Tylous/Limelighter [Fake Cert] - https://github.com/gmh5225/chainoffools [Fake Cert] - https://github.com/gmh5225/FakeSign [Fake Cert] - https://github.com/Adepts-Of-0xCC/MiniDumpWriteDumpPoC [Dump Memory] - [A x64 Write-What-Where exploit+shellcode execution vulnerability](https://www.unknowncheats.me/forum/anti-cheat-bypass/503519-wwwaryasinject-x64-write-exploit-shellcode-execution-vulnerability.html) - [Dll injection through code page id modification in registry](https://github.com/NtQuerySystemInformation/NlsCodeInjectionThroughRegistry) - https://github.com/huoji120/Etw-Syscall [ETW Syscall] - https://github.com/weak1337/SkipHook [Skip Hook] - https://github.com/ekknod/SetWindowHookEx [Using SetWindowHookEx for preinjected DLL's] - [A tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature](https://github.com/med0x2e/SigFlip) - [Simple program to stream offsets for your game cheat](https://github.com/gmh5225/OffsetStreaming) - https://github.com/jnastarot/HIGU_ntcall [Direct System Calls] - https://github.com/rbmm/LockFile-Poc [Lock File] - [A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more](https://github.com/gmh5225/ANGRYORCHARD) - https://github.com/gmh5225/dll-encryptor [Able to stream a dll without touching your disk] - [Running Shellcode Through EnumDisplayMonitors](https://marcoramilli.com/2022/06/15/running-shellcode-through-windows-callbacks/?utm_source=twitter&utm_medium=social&utm_campaign=ReviveOldPost) - [open-source windows defender manager can disable windows defender permanently](https://github.com/qtkite/defender-control) - [Read Memory without ReadProcessMemory for Current Process](https://github.com/gmh5225/CReadMemory) - [get process token whose integrity level is system and manipulate it to get privilege escalation](https://github.com/gmh5225/manipulating_token) - [A library that meant to perform evasive communication using stolen browser socket](https://github.com/Idov31/Venom) - https://github.com/cpz/trinity [Fully disables & removes Windows Defender] - https://github.com/EvilGreys/Disable-Windows-Defender- [Disable Windows Defender] - https://github.com/gabriellandau/ShadowStackWalk [Finding Truth in the Shadows] - https://github.com/gmh5225/r0ak [r0ak] - https://github.com/ZeroMemoryEx/Wizard-Loader [Abuse Xwizard.exe for DLL Side-Loading] - https://github.com/LloydLabs/shellcode-plain-sight [Hiding shellcode in plain sight within a large memory region] - https://github.com/huntandhackett/process-cloning [Clone process] - https://github.com/backengineering/msrexec [Elevate arbitrary MSR writes to kernel execution] - https://github.com/deepinstinct/Dirty-Vanity [Abusing RtlCreateProcessReflection] - https://github.com/mandiant/ShimCacheParser [Shim Cache parser] > Android - https://github.com/WindySha/bypassHiddenApiRestriction [Bypass hidden api restriction] - https://github.com/LSPosed/AndroidHiddenApiBypass [Bypass hidden api restriction] - https://github.com/stars-one/ASCTool [Apk Signature Crack Tool] - https://github.com/ekknod/usbsn [USB serial number changer (root only)] - https://github.com/gmh5225/Android-privilege-CVE-2022-20452-LeakValue [Privilege Escalation] - https://github.com/tiann/KernelSU [A Kernel based root solution for Android GKI] - https://github.com/MlgmXyysd/KernelSU_Debug [KernelSU modified for debugging] - https://github.com/CoolestEnoch/kernel-su-huawei-nova2 [KernelSU for huawei] - https://github.com/gmh5225/android_kernel_huawei_hi6250-8_Exp [KernelSU for huawei] - https://github.com/abcz316/SKRoot-linuxKernelRoot [Kernel root] - https://github.com/Dr-TSNG/ZygiskOnKernelSU [Run Zygisk on KernelSU] ## Windows Security Features - https://github.com/yardenshafir/cet-research [CET] - https://github.com/gmh5225/CET-win10 [CET] - [HyperGuard](https://windows-internals.com/hyperguard-secure-kernel-patch-guard-part-1-skpg-initialization) - https://github.com/gmh5225/QueryShadowStack [Shadow Stack] - https://namazso.github.io/x86/html/INCSSPD_INCSSPQ.html [CET] - https://techcommunity.microsoft.com/t5/windows-os-platform-blog/understanding-hardware-enforced-stack-protection/ba-p/1247815 [CET] - https://reviews.llvm.org/rG21b25a1fb32ecd2e1f336123c2715f8ef1a49f97 [CET] - https://www.osronline.com/article.cfm%5earticle=469.htm [SEH] ## Windows Subsystem for Linux - https://github.com/microsoft/WSL2-Linux-Kernel - https://github.com/sxlmnwb/windows-subsystem-linux - https://github.com/Nevuly/WSL2-Linux-Kernel-Rolling [Stable Kernel for WSL2] ## Windows Subsystem for Android - https://github.com/K3V1991/How-to-download-and-install-WSA [Guide] - https://github.com/KiruyaMomochi/wsa-kernel-build [Build WSA Kernel with Docker] - https://github.com/sergiovillaverde/win11_apk_installer - https://github.com/LSPosed/MagiskOnWSA - https://github.com/alesimula/wsa_pacman - https://github.com/WSA-Community/WSA-Linux-Kernel - https://github.com/Paxxs/BuildWSA - https://github.com/LSPosed/MagiskOnWSALocal - https://github.com/cinit/WSAPatch [Make WSA run on Windows 10] - https://github.com/MustardChef/WSABuilds - https://github.com/LSPosed/WSA-Kernel-SU [WSA with KernelSU] ## Windows Emulator - https://github.com/brunodev85/winlator [Android application for running Windows applications with Wine and Box86/Box64] ## Android Emulator - https://github.com/Genymobile - https://github.com/Genymobile/genymotion-kernel - https://github.com/anbox/anbox - https://github.com/jwmcglynn/android-emulator - https://github.com/google/android-emulator-hypervisor-driver - https://github.com/ant4g0nist/rudroid [Rust] - https://github.com/qemu-gvm/qemu-gvm [QEMU] - https://github.com/quarkslab/AERoot [Root] ## IOS Emulator - https://github.com/ChefKissInc/qemu-apple-silicon ## Game Boy - https://github.com/xkevio/kevboy [Emulator] - https://github.com/vojty/feather-gb [Emulator] - https://github.com/chrismaltby/gb-studio [GB Studio] ## Nintendo Switch - https://github.com/yuzu-mirror - https://github.com/Ryujinx/Ryujinx - https://github.com/gmh5225/Nintendo-Switch-Emulator-yuzu - https://github.com/gmh5225/yuzu-android - https://github.com/Logboy2000/yuzu-archive - https://github.com/gmh5225/nuzu [Yuzu based repository] - https://github.com/CTCaer/hekate [A GUI based Nintendo Switch Bootloader] - https://github.com/Atmosphere-NX/Atmosphere [Customized firmware] - https://github.com/tomvita/SE-tools [Memory hacking] - https://github.com/jakcron/nstool [General purpose read/extract tool] ## Xbox - https://github.com/xemu-project/xemu [Xbox Emulator for Windows] - https://github.com/rexdex/recompiler [Porting Xbox360 executables to Windows]