Skip to content

Functional memory header for opening handle, getting modules and read/writing to process.

Notifications You must be signed in to change notification settings

REVRBE/revrbe-better-memory

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 

Repository files navigation

# revrbe-better-memory

Functional memory header for opening handle, getting modules and read/writing to process.

Currently its using NtOpenProcess to open a handle to the process and then NtReadVirtualMemory and NtWriteVirtualMemory to perform memory operations.

Features and to-do

✅ Bunnyhop

✅ Clean modern C++ code

✅ Memory operations (read/write)

✅ NtOpenProcess, NtReadVirtualMemory & NtWriteVirtualMemory syscalls

✅ Polymorphism

✅ Dynamically loading Native API functions and ntdll.dll (JIT)

❌ Changing the rest of the Windows API functions to Native API functions(CreateToolhelp32Snapshot, Process32Next, Module32Next, ProcessIdToSessionId, GetModuleHandle & GetProcAddress)

Usage

Currently only bhop, but compile and run the executable.

Only tested on Windows 10 21H2

Warning: This is for educational purposes only. Using this in-game might result in a ban. Use at your own risk!

Personal Note

Was too bored to implement any actual cheat features, but tested with simple bunny-hop and it works fine. For extra security; I recommend using Themida, VMProtect or Enigma.

Discord: revrbe

Update

I fixed the code, so it works better than before. Also I removed the XOR encryption on the memory operations, but will probably re-add it again soon with a more reliable implementation.

I also added NtReadVirtualMemory and NtWriteVirtualMemory instead of Windows API counterparts and also made necessary functions and libraries dynamically loaded using JIT techniques.