Pinned Repositories
APIHook-Library
Library for using API hooks to change the control flow of subroutine(s) and use plain-text for lookup-based hooks.
authzsec-mod-um
This is a project serving as a supplementary security module as a user-mode interface to a kernel-mode service using Windows ACLs and (TBA) AppContainer technology and other forms of object isolation.
KeProcessOverlay
Reading/writing memory from kernel-mode
MemDiff
Record the modifications that software arbitrarily makes to other processes code and data sections, then generate code "macros" reflecting those changes.
Python-Object-Explorer
Allows the inspection of how Python objects are mapped in the memory of a foreign Python runtime, it can intercept processes that are interpreted or are executing native code via static compilation by projects like Nuitka
Remote-Thread-Executor
Code injection by hijacking threads in Windows 32-bit applications
RudiAC
A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory integrity checks, thread execution restrictions, hook detection, memory honeypots, and more.
RVDbg
RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, documented code base being worked on in: core branch)
UTKModule
Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument for the thread to a different location, but with the same executable memory. Bypasses some generic memory integrity checks.
vmemory
Cross-platform library for reading/writing memory in other processes for Rust
johnsonjason's Repositories
johnsonjason/RVDbg
RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, documented code base being worked on in: core branch)
johnsonjason/RudiAC
A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory integrity checks, thread execution restrictions, hook detection, memory honeypots, and more.
johnsonjason/vmemory
Cross-platform library for reading/writing memory in other processes for Rust
johnsonjason/Remote-Thread-Executor
Code injection by hijacking threads in Windows 32-bit applications
johnsonjason/KeProcessOverlay
Reading/writing memory from kernel-mode
johnsonjason/UTKModule
Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument for the thread to a different location, but with the same executable memory. Bypasses some generic memory integrity checks.
johnsonjason/MemDiff
Record the modifications that software arbitrarily makes to other processes code and data sections, then generate code "macros" reflecting those changes.
johnsonjason/Python-Object-Explorer
Allows the inspection of how Python objects are mapped in the memory of a foreign Python runtime, it can intercept processes that are interpreted or are executing native code via static compilation by projects like Nuitka
johnsonjason/APIHook-Library
Library for using API hooks to change the control flow of subroutine(s) and use plain-text for lookup-based hooks.
johnsonjason/authzsec-mod-um
This is a project serving as a supplementary security module as a user-mode interface to a kernel-mode service using Windows ACLs and (TBA) AppContainer technology and other forms of object isolation.
johnsonjason/WPSet
This source sets the cr0 register (control register) then changes the write protection bit and disables it temporarily.
johnsonjason/MapleStoryBuildFramework
Modifies the client for the private server to be individualized for distribution with a rudimentary anti-cheat. Related to: https://github.com/longm0de/RudiAC