0x1-1 / Battleye-VAC-EAC-Kernel-BypassView external linksLinks
Kernel mode bypass for BattlEye, EAC
☆190Oct 25, 2023Updated 2 years ago
Alternatives and similar repositories for Battleye-VAC-EAC-Kernel-Bypass
Users that are interested in Battleye-VAC-EAC-Kernel-Bypass are comparing it to the libraries listed below
Sorting:
- EAC Bypass☆315May 11, 2020Updated 5 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- Kernel cheat with kernel hook for communication☆295Jul 24, 2021Updated 4 years ago
- Reversing EasyAntiCheat.☆580Apr 19, 2019Updated 6 years ago
- Manual mapping without creating any threads, with rw only access☆804Oct 29, 2019Updated 6 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆353Sep 13, 2020Updated 5 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆180Nov 5, 2020Updated 5 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆107Nov 5, 2020Updated 5 years ago
- DLL scatter manual mapper☆810Apr 10, 2021Updated 4 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆376Mar 15, 2024Updated last year
- ☆185May 5, 2019Updated 6 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- Kernel Inject DLL☆352Mar 21, 2023Updated 2 years ago
- ☆144Jan 10, 2020Updated 6 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆421Sep 9, 2018Updated 7 years ago
- C++ graphics kernel subsystem hook☆560Jan 11, 2021Updated 5 years ago
- BattlEye compatible injector, done completely from user-mode, project by secret.club☆251Oct 25, 2020Updated 5 years ago
- Kernel LdrLoadDll injector☆264Oct 6, 2018Updated 7 years ago
- c++ UE4 cheat w/ driver files☆160Jul 1, 2022Updated 3 years ago
- hwid-checker-mg is simple, proof-of-concept, hardware id checker made in C++ that utilizes the SMBIOS/DMI standards to output information…☆111Mar 25, 2022Updated 3 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- undetected eac mapper☆169May 3, 2022Updated 3 years ago
- Kernel-mode Windows HWID spoofer☆605Jan 22, 2024Updated 2 years ago
- Utilizes a kernel driver for hooking steams overlay than manual mapping our dll to the games memory. Has a bunch of features like esp and…☆92Feb 6, 2020Updated 6 years ago
- PoC EFI runtime driver for memory r/w & kdmapper fork☆565Nov 30, 2024Updated last year
- ☆109Nov 13, 2023Updated 2 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Access without a real handle☆1,033Apr 10, 2021Updated 4 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Mar 8, 2020Updated 5 years ago
- Windows kernel samples☆256Apr 28, 2019Updated 6 years ago
- An usermode BE Rootkit Bypass☆240May 1, 2019Updated 6 years ago
- driver manual mapper (outdated/for educational purposes)☆114May 17, 2019Updated 6 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Oct 20, 2020Updated 5 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- VAC3 (Valve Anti-Cheat) disabler/inhibitor/bypass☆339Mar 2, 2023Updated 2 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆622Feb 22, 2019Updated 6 years ago
- 🪝 Various EPT hook detection approaches☆143Jul 29, 2025Updated 6 months ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆382Jan 29, 2022Updated 4 years ago