☆81Nov 10, 2020Updated 5 years ago
Alternatives and similar repositories for Direct-EFI-Apex-Cheat
Users that are interested in Direct-EFI-Apex-Cheat are comparing it to the libraries listed below
Sorting:
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆477Jan 8, 2023Updated 3 years ago
- PoC EFI runtime driver for memory r/w & kdmapper fork☆570Nov 30, 2024Updated last year
- ☆143Jan 10, 2020Updated 6 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- open source fortnite cheat☆23Apr 10, 2022Updated 3 years ago
- ☆43Jan 22, 2019Updated 7 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Using DKOM to hide kernel mode drivers☆56Dec 28, 2017Updated 8 years ago
- Just a basic Offsets and Netvar dumper for Apex Legends☆101Oct 1, 2021Updated 4 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- ☆75Dec 17, 2019Updated 6 years ago
- APEX Full internal Cheat☆62Apr 9, 2020Updated 5 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆86Apr 25, 2019Updated 6 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- c++ UE4 cheat w/ driver files☆160Jul 1, 2022Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- undetected eac mapper☆171May 3, 2022Updated 3 years ago
- external apex legends cheat - esp, chams, rcs☆105Jan 18, 2025Updated last year
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- ☆58Mar 14, 2023Updated 2 years ago
- ☆146Jan 13, 2021Updated 5 years ago
- An other Detected & Pasted driver☆24Jun 30, 2022Updated 3 years ago
- Early 2019 - late 2020. R.I.P. CVE-2020-12928 https://h0mbre.github.io/RyzenMaster_CVE/#☆59Feb 14, 2021Updated 5 years ago
- base for testing☆187Sep 28, 2024Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- ☆146Dec 28, 2020Updated 5 years ago
- ☆51Dec 19, 2023Updated 2 years ago
- Just my first IOCTL try☆75Jul 9, 2020Updated 5 years ago
- Kernel-mode Windows HWID spoofer☆612Jan 22, 2024Updated 2 years ago