HadockKali / battleye-user-mode-bypassLinks
BattlEye compatible injector, done completely from user-mode.
☆54Updated 2 years ago
Alternatives and similar repositories for battleye-user-mode-bypass
Users that are interested in battleye-user-mode-bypass are comparing it to the libraries listed below
Sorting:
- Hide external overlay by using SetWindowDisplayAffinity☆97Updated 4 years ago
- This tool Decrypt and Extract the files from the EAC☆70Updated 3 months ago
- undetected eac mapper☆166Updated 3 years ago
- External Il2Cpp Framework☆63Updated 4 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆144Updated 5 years ago
- manually map driver for a signed driver memory space☆162Updated 4 years ago
- game dumper☆46Updated 5 years ago
- Game cheat base and clean architecture for your next cheat☆105Updated last year
- ☆52Updated 4 years ago
- csgo external running from kernelmode☆106Updated 2 years ago
- ☆112Updated last year
- 🔵 EAC - BE / Kernel Driver 🔵☆90Updated last year
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Updated 2 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆102Updated 3 years ago
- My external using a remade vanta menu, data ptr driver with some cool stuff. I got ratted and decided to self leak so have fun!☆56Updated last year
- Just a external cheat source for Fortnite with a kernel driver (using data pointer communication)☆125Updated last year
- This is a simple project of a driver + usermode.☆162Updated 3 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172Updated 3 years ago
- A reimplementation of byfrons NO_ACCESS memory protection feature☆55Updated 3 years ago
- Cool kernel communication method.☆99Updated 4 years ago
- Rainbow Six Cheat - V2☆103Updated 9 months ago
- Its a header-only runtime tool for importing functions from modules.☆45Updated 2 years ago
- Drawing from kernelmode without any hooks☆173Updated 3 years ago
- BattlEye shellcodes tester☆149Updated 3 years ago
- A simple UM + KM example of how to bypass EAC CR3☆163Updated last month
- Control your mouse using razer synapse☆91Updated 4 years ago
- sdk based internal for pasters☆47Updated 3 years ago
- Simple tool deobfuscating a Modern Warfare dump so IDA can analyse it right way (and faster).☆26Updated 4 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆180Updated last year
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago