Ricardonacif / launcher-abuser
Stealthy way to hijack the existing game process handle within the game launcher (currently supports Steam and Battle.net). Achieve external game process read/write with minimum footprint.
☆96Updated 3 years ago
Related projects: ⓘ
- A customizable process dumper.☆130Updated 5 years ago
- ☆135Updated 3 years ago
- driver mapper / capcom wrapper☆213Updated 4 years ago
- VAC3 module emulator☆95Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆194Updated 2 years ago
- Module extending manual mapper☆295Updated 4 years ago
- manually map driver for a signed driver memory space☆136Updated 3 years ago
- ☆97Updated this week
- Hooking kernel functions by abusing alignment☆238Updated 3 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆144Updated 3 years ago
- Windows kernel samples☆243Updated 5 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Updated 4 years ago
- Memory hacking library powered by AMD SVM☆290Updated last year
- Browse Page Tables on Windows (Page Table Viewer)☆178Updated 2 years ago
- BattlEye BEClient<->BEService usermode emulator☆79Updated 4 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆225Updated 5 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆299Updated 2 years ago
- ☆64Updated 4 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆103Updated 3 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆241Updated 4 years ago
- undetected eac mapper☆161Updated 2 years ago
- BattlEye shellcodes tester☆133Updated 2 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆260Updated last year
- A mini anti-anti debug hooking library for Windows.☆103Updated 3 years ago
- ☆160Updated 7 years ago
- Analyze patches in a process☆241Updated 3 years ago
- ☆253Updated this week
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆100Updated last year
- ☆91Updated this week