IntelSDM / UnityStealerLinks
Unity Malware POC, Using unity's code signing to safely execute a payload
☆15Updated 2 years ago
Alternatives and similar repositories for UnityStealer
Users that are interested in UnityStealer are comparing it to the libraries listed below
Sorting:
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆31Updated last year
- Windows driver mapper via the UEFI☆47Updated last month
- Kernel and Usermode Spoofer for SCP:SL☆50Updated last year
- An advanced kernel anti cheat I made with some friends☆32Updated last year
- ntoskrnl .data hooks for UM-KM communication☆40Updated last year
- Fixes the "Device\Nal is already in use" error on kdmapper.☆20Updated 2 years ago
- ☆45Updated last year
- ☆78Updated last year
- page table manipulation to gain physical r/w☆43Updated last year
- This tool Decrypt and Extract the files from the EAC☆66Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆75Updated last year
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆108Updated 10 months ago
- communicate with kernel using a image on disk☆16Updated last year
- Various IDA scripts I've created for Reverse engineering.☆85Updated 8 months ago
- Fortnite External Leak Undetected EasyAntiCheat 2024 blabla black people☆42Updated 11 months ago
- ☆47Updated last year
- Usermode emulation of x64 EAC☆29Updated 4 years ago
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆22Updated 3 months ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆67Updated 10 months ago
- ☆37Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆46Updated last year
- Hardware ID☆48Updated 3 years ago
- Just check hypervisor in ring0☆15Updated 2 years ago
- Finished source of my fortnite cheat.☆22Updated 2 years ago
- A plugin for x64dbg that can copy RVA from unknown memory pages☆34Updated 3 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 3 years ago
- ☆83Updated last year
- Reverse engineering utilities library written in meta-modern c++☆50Updated 2 years ago
- Header only UM AC "bypass"☆19Updated last year
- Anti Suspend and Detect Detaching from debuggers.☆17Updated last year