Azvanzed / EAC-Payload-DumperLinks
Extracts eac's payload which is injected into the game at runtime.
☆30Updated 3 months ago
Alternatives and similar repositories for EAC-Payload-Dumper
Users that are interested in EAC-Payload-Dumper are comparing it to the libraries listed below
Sorting:
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- Extracts eac's driver at runtime without it touching the disk.☆33Updated 4 months ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆42Updated 3 years ago
- ☆41Updated 2 years ago
- ☆21Updated 3 years ago
- Made by scammer so i leak for free ! have fun☆56Updated 2 years ago
- Old way for blocking NMI interrupts☆27Updated 2 years ago
- Hiding a system thread against conventional means of detection☆41Updated 4 years ago
- ☆32Updated 3 years ago
- ☆55Updated 2 years ago
- i stole this from some guys private repo on github☆57Updated 4 years ago
- POC kernel driver with hidden system thread☆14Updated last year
- ☆50Updated last year
- A simple MmCopyMemory hook.☆37Updated 3 years ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆19Updated 2 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- PAGE_GUARD based hooking library☆47Updated 3 years ago
- 将驱动映射到会话空间☆35Updated 2 years ago
- a simple obfuscator☆1Updated last year
- page table manipulation to gain physical r/w☆44Updated last year
- Had this laying around on my Disk☆17Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- ☆53Updated 2 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆63Updated 2 years ago
- ☆42Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- UD overlay using SetWindowsHookEx☆16Updated 3 years ago
- ☆46Updated 3 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆42Updated 9 months ago