TheCruZ / Direct-EFI-Apex-CheatLinks
☆76Updated 4 years ago
Alternatives and similar repositories for Direct-EFI-Apex-Cheat
Users that are interested in Direct-EFI-Apex-Cheat are comparing it to the libraries listed below
Sorting:
- manually map driver for a signed driver memory space☆157Updated 4 years ago
- ☆73Updated 5 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆101Updated 3 years ago
- Cool kernel communication method.☆101Updated 3 years ago
- Calling "own" MouseClassServiceCallback☆68Updated 2 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Updated 4 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆94Updated 3 years ago
- APEX Full internal Cheat☆66Updated 5 years ago
- Minimal memory library for Windows / Linux☆62Updated last year
- undetected eac mapper☆165Updated 3 years ago
- ☆49Updated 5 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆51Updated last year
- Just my first IOCTL try☆73Updated 4 years ago
- ☆36Updated 3 years ago
- ☆54Updated 2 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆171Updated 3 years ago
- A lightweight BattlEye emulator of the launcher☆61Updated 2 years ago
- csgo external running from kernelmode☆109Updated 2 years ago
- ☆144Updated 4 years ago
- 🔵 EAC - BE / Kernel Driver 🔵☆87Updated 9 months ago
- ☆35Updated 4 years ago
- bypass to the p2c(s) that I have run over the past few months.☆51Updated 2 years ago
- Early 2019 - late 2020. R.I.P. CVE-2020-12928 https://h0mbre.github.io/RyzenMaster_CVE/#☆52Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 6 years ago
- Discarded Section Manual Map☆68Updated 4 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- ☆141Updated last year
- Memory integrity check with CRC32 instruction, section-based☆44Updated last week
- Proof of concept on how to bypass some limitations of a manual mapped driver☆171Updated 4 years ago