A lightweight BattlEye emulator of the launcher
☆64Aug 27, 2022Updated 3 years ago
Alternatives and similar repositories for FakeEye
Users that are interested in FakeEye are comparing it to the libraries listed below
Sorting:
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Sep 1, 2022Updated 3 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆41Jan 9, 2023Updated 3 years ago
- ☆30Dec 26, 2021Updated 4 years ago
- My research WIP bluepill hypervisor☆40Mar 15, 2023Updated 2 years ago
- Disks for DMA☆141Apr 28, 2021Updated 4 years ago
- Test data for x86 instructions☆13Apr 13, 2021Updated 4 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 4 years ago
- BattlEye shellcodes tester☆151Jan 3, 2022Updated 4 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆104Aug 3, 2023Updated 2 years ago
- ☆158May 21, 2024Updated last year
- AMD Hypervisor written writh Rust.☆162Sep 14, 2023Updated 2 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆58Oct 14, 2022Updated 3 years ago
- undetected eac mapper☆170May 3, 2022Updated 3 years ago
- devirtualization vmprotect☆65Mar 11, 2023Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆99Aug 27, 2022Updated 3 years ago
- a better bsg launcher hwid check bypass☆53May 24, 2023Updated 2 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- Code for Battleyes shellcode☆239Nov 11, 2021Updated 4 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆103Jun 26, 2023Updated 2 years ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆379Mar 15, 2024Updated last year
- Hypervisor-based debugger for AMD processors☆63May 13, 2024Updated last year
- Windows kernel PDB data parsed into YAML☆42Nov 2, 2025Updated 3 months ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Mar 18, 2019Updated 6 years ago
- my own implementation cz yes☆99Oct 18, 2021Updated 4 years ago
- ☆136Aug 6, 2022Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆235Dec 21, 2021Updated 4 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆385Jan 29, 2022Updated 4 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- Mathematical Operation Simplifier for .NET Applications☆17Nov 20, 2019Updated 6 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆470Jan 3, 2022Updated 4 years ago