EntityPrimeDev / BloodHuntSource
Fully UD On EAC Now Enjoy Pasters :)
☆15Updated last year
Related projects ⓘ
Alternatives and complementary repositories for BloodHuntSource
- Loader base source using keyauth made by me with basic protection, u can use it as a base for your spoofer/cheat loader☆26Updated 2 months ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆19Updated 9 months ago
- A simple MmCopyMemory hook.☆33Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Updated last year
- RWX Section Abusing☆17Updated 11 months ago
- fecurity executor from factory☆33Updated 2 years ago
- A simple present scene, kernel allocation injector.☆23Updated 2 years ago
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Updated last year
- Only for Stress-Testing☆22Updated 2 years ago
- A simple kernel driver for R/W Using kSockets with some bypass implementation overall I wouldn't say its "ud"☆40Updated 2 months ago
- An Undetected BE Kernel Driver I developed, Will probably be detected upon releasing this but can be made undetected very easily. Does no…☆52Updated last month
- Header only UM AC "bypass"☆16Updated 6 months ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- ☆44Updated 2 years ago
- Bypass using kernel driver (not finish).☆19Updated last year
- Made by scammer so i leak for free ! have fun☆55Updated last year
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- clearing traces of a loaded driver☆44Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- ☆50Updated 10 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆29Updated 7 months ago
- Kernel Level NMI Callback Blocker☆29Updated 2 months ago
- Windows Kernel Misc☆21Updated last year