Pinned Repositories
.data-ptr-swap
i stole this from some guys private repo on github
aarch64_silent_syscall_hook
silent syscall hooking without modifying sys_call_table/code via patching exception handler
android_touch
Low latency high speed android multitouch event server
AntiDebugandMemoryDump
Anti-Debug and Anti-Memory Dump for Android
EspModMenuPubgMobile
PUBA
MemoryTool
用于读写Android下进程内存信息
MultiTouch
a cross platform Multi-Touch library that aims to provide a unified Multi-Touch API
PUBGMTouchSimuAim
Touch emulator Aim
rwProcMem33
Linux read & write process memory module.
TouchSimulation
Touch Simulation in Golang - Simulate Touch Points using UInput
abcz1114's Repositories
abcz1114/Android_boot_image_editor
Parsing and re-packing Android boot.img/vbmeta.img/payload.bin, supporting Android 13 preview
abcz1114/awesome-game-security
awesome game security [Welcome to PR]
abcz1114/ayaya-league-external
External script platform for League of Legends
abcz1114/BYPASS-PUBG-MOBILE-IMGUI
The source is very good with beautiful imgui
abcz1114/CallMeWin32kDriver
Load your driver like win32k.sys
abcz1114/CallStack-Spoofer
This tool will allow you to spoof the return addresses of your functions as well as system functions.
abcz1114/ClearDriverTraces
clearing traces of a loaded driver
abcz1114/EffectiveModernCppChinese
《Effective Modern C++》翻译 - 已完成
abcz1114/hide_execute_memory
隐藏可执行内存
abcz1114/kdmapper-dumper
KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.
abcz1114/KernelDrawing
Drawing from kernelmode without any hooks
abcz1114/KernelSU
A Kernel based root solution for Android GKI
abcz1114/meme-rw
rw driver
abcz1114/Nmi
Old way for blocking NMI interrupts
abcz1114/NotifyRoutineHijackThread
Hijack NotifyRoutine for a kernelmode thread
abcz1114/Ntoskrnl_Viewer
可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。
abcz1114/PolarImGui
This is the original ImGui based unity menu on android
abcz1114/Root
?什么你说Root?我不到啊 | 致力于编写全面详细的Root教程文档 | 刷机 | 安卓
abcz1114/SessionMapper
将驱动映射到会话空间
abcz1114/ShellcodeFluctuation
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
abcz1114/SPACEPORT
abcz1114/study
Study blog文章合集
abcz1114/TFT-OCR-BOT
A bot that plays Teamfight Tactics using OCR. Keeps track of bench, board, items, and plays the user defined team comp.
abcz1114/ThreadStackSpoofer
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
abcz1114/TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
abcz1114/Triton
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
abcz1114/UE4-Apk-Dumper
SDKDumper for Unreal Engine Games running on Android,
abcz1114/Valorant-External
Aimbot + Esp + Spoofer / C++
abcz1114/VMUnprotect
VMUnprotect can dynamically log and manipulate calls from virtualized methods by VMProtect.
abcz1114/warbird-hook
Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard