There are no reviews yet. Be the first to send feedback to the community and the maintainers!
bedaisy-reversal
Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.bedaisy-bypass
BEDaisy.sys report bypassbattleye-decryption
Decrypts multiple BattlEye packets from BEService<>BEDaisy (including those with multiple encryption layers) out to a console.edk2-cmake
Example of how to build windows uefi's (linking to edk2/EDK-II) with cmake.battleye-shellcode
A couple of streamed BattlEye shellcode/module psuedo snippets from Rainbow Six: Siege.cod-deob
A program written in C++ to remove and cleanup code flow obfuscation seen in a variety of Call of Duties titles.ninja-bf4
Battlefield 4 cheats made for NiNJA in 2019. https://youtu.be/ri9iNSaQKgQida-gameguard-str-dec
IDA script to dump out and label encrypted strings in nProtect GameGuard modules. Tested on Helldivers2ninja-bf3
Battlefield 3 cheats made for NiNJA in 2019. https://youtu.be/5LSFO8ogk28x360-challenge-api
Xbox 360 challenge api (hv & supervisor challenges), written in C++ for Linux with cmake :) WIPppc-vm
PowerPC (64bit) virtual machine with support for ram, stack, syscalls, and threading. WIPes3-modifier
A package to decrypt, edit and encrypt EasySave files used in Unity gamesmapped-dumper
A program written in C++ for remotely dumping manual mapped modules.py-assembler
Python script to assemble and disassemble x86/x64 assembly using gcc and objdump.binary-reader
Simple class to read from a bufferxblive-cod
Call of Duty cheats up until BO3, created by myself and BLiNDzZ in 2019. https://youtu.be/tn1i7REX0l8py-ppc-xex
Start of a virtual machine written in Python to emulate loading an XEX file and invoking functions (WIP)Love Open Source and this site? Check out how you can help us