AlSch092
Game Security enthusiast doing Netcode Emulation, Anti-cheat & Application Security Research
aschwarz92@outlook.comCanada
Pinned Repositories
DetectOpenHandles
Code example of detecting open process handles to our process (C/C++, Windows)
HideStaticReferences
Research into removing strings & API call references at compile-time (Anti-Analysis)
Mir4-ClientEmulator
Network Client Emulator for Mir4 Global, written in C#
ModifyExports
Research of modifying exported function names at runtime (C/C++, Windows)
ModifyTLSCallbacks
Edit the program's TLS callbacks at runtime
NCShark
Pcap Driver Packet Analyzer for Night Crows
ObfuscateThis
Templated Obfuscation example in C++ for protecting/hiding values in memory
OKPOE
Automation & scripting tool for Path of Exile.
RemapProtectedClass
Maps view of a section pointing to a class/struct object with SEC_NO_CHANGE & PAGE_EXECUTE_READ, protecting it from page protection modifications and memory writes
UltimateAntiCheat
UltimateAntiCheat is an open source usermode anti-cheat system made to detect and prevent common attack vectors in game hacking (C++, Windows)
AlSch092's Repositories
AlSch092/UltimateAntiCheat
UltimateAntiCheat is an open source usermode anti-cheat system made to detect and prevent common attack vectors in game hacking (C++, Windows)
AlSch092/ObfuscateThis
Templated Obfuscation example in C++ for protecting/hiding values in memory
AlSch092/HideStaticReferences
Research into removing strings & API call references at compile-time (Anti-Analysis)
AlSch092/OKPOE
Automation & scripting tool for Path of Exile.
AlSch092/ModifyExports
Research of modifying exported function names at runtime (C/C++, Windows)
AlSch092/NCShark
Pcap Driver Packet Analyzer for Night Crows
AlSch092/DetectOpenHandles
Code example of detecting open process handles to our process (C/C++, Windows)
AlSch092/ModifyTLSCallbacks
Edit the program's TLS callbacks at runtime
AlSch092/PE-Injection
Injection Technique: Inserts current process into target process
AlSch092/Mir4-ClientEmulator
Network Client Emulator for Mir4 Global, written in C#
AlSch092/MirM-PacketEditor
Packet Editor with LUA scripting functionality for Mir:M
AlSch092/RemapProtectedClass
Maps view of a section pointing to a class/struct object with SEC_NO_CHANGE & PAGE_EXECUTE_READ, protecting it from page protection modifications and memory writes
AlSch092/APC-PE-Injector
APC Injection is a code injection technique which bypasses TLS callback protections (Windows OS)
AlSch092/Mir4-PacketEncryption
Packet Encryption for Mir4.
AlSch092/HoH-PacketEditor
Packet editor for Honor of Heirs
AlSch092/ProcessInternals
Reference point for enumerating assets of Windows processes
AlSch092/TreeOfSaviorPE
Packet editor for Tree Of Savior with embedded LUA scripting
AlSch092/ChangeModuleName
MITRE ATT&CK Submission - Changing Module names at runtime
AlSch092/DragonClient
Headless client / network emulator for DragonNest MMORPG
AlSch092/imcCrypt
IMC Games packet encryption methods for Granado Espada
AlSch092/AlSch092
Profile Repo
AlSch092/AssaultCubeNoob
AssaultCubeNoob is a simple aimbot for Assault Cube, featuring a minimal codebase
AlSch092/DragonCrypto
Encryption module in C for DragonNest MMORPG
AlSch092/TargetPractice
Research into how we can detect aim cheats in FPS games using player's directional data sets
AlSch092/Unprotect_Submission
Repository to publish your evasion techniques and contribute to the project