Enoz / DMALib
MemProcFS Wrapper
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for DMALib
- ☆18Updated 2 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆45Updated 3 years ago
- ☆18Updated 3 years ago
- ☆45Updated 2 years ago
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆28Updated last year
- C/C++ example of InjectMouseInput function☆32Updated 3 years ago
- page table manipulation to gain physical r/w☆38Updated 6 months ago
- This is a demonstration of how anti-cheats can evolve to gather original disk serials hidden behind RAID0.☆16Updated last year
- clearing traces of a loaded driver☆44Updated 2 years ago
- ☆21Updated 2 years ago
- UAC - Cheat developer platform☆28Updated 3 years ago
- UD overlay using SetWindowsHookEx☆15Updated 2 years ago
- ☆41Updated 3 years ago
- 将驱动映射到会话空间☆32Updated 2 years ago
- ☆50Updated 10 months ago
- ☆43Updated 3 years ago
- Single header code that sets any section's page to No Access☆11Updated 2 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆24Updated 3 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- x64 manual mapper using inline syscalls☆5Updated 3 years ago
- Bypass using kernel driver (not finish).☆19Updated last year
- A plugin for Unispect for reading memory through a FPGA board☆13Updated 3 months ago