TheCruZ / Direct-EFI-Apex-CheatView external linksLinks
☆81Nov 10, 2020Updated 5 years ago
Alternatives and similar repositories for Direct-EFI-Apex-Cheat
Users that are interested in Direct-EFI-Apex-Cheat are comparing it to the libraries listed below
Sorting:
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆473Jan 8, 2023Updated 3 years ago
- PoC EFI runtime driver for memory r/w & kdmapper fork☆565Nov 30, 2024Updated last year
- ☆144Jan 10, 2020Updated 6 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- open source fortnite cheat☆23Apr 10, 2022Updated 3 years ago
- ☆43Jan 22, 2019Updated 7 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Using DKOM to hide kernel mode drivers☆56Dec 28, 2017Updated 8 years ago
- Just a basic Offsets and Netvar dumper for Apex Legends☆101Oct 1, 2021Updated 4 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆171Oct 24, 2020Updated 5 years ago
- ☆75Dec 17, 2019Updated 6 years ago
- APEX Full internal Cheat☆63Apr 9, 2020Updated 5 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆88Apr 25, 2019Updated 6 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- c++ UE4 cheat w/ driver files☆160Jul 1, 2022Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Oct 20, 2020Updated 5 years ago
- Discarded Section Manual Map☆68Jun 18, 2020Updated 5 years ago
- undetected eac mapper☆169May 3, 2022Updated 3 years ago
- external apex legends cheat - esp, chams, rcs☆104Jan 18, 2025Updated last year
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- ☆59Mar 14, 2023Updated 2 years ago
- ☆146Jan 13, 2021Updated 5 years ago
- An other Detected & Pasted driver☆24Jun 30, 2022Updated 3 years ago
- Early 2019 - late 2020. R.I.P. CVE-2020-12928 https://h0mbre.github.io/RyzenMaster_CVE/#☆59Feb 14, 2021Updated 5 years ago
- base for testing☆186Sep 28, 2024Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- ☆147Dec 28, 2020Updated 5 years ago
- ☆51Dec 19, 2023Updated 2 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- Kernel-mode Windows HWID spoofer☆605Jan 22, 2024Updated 2 years ago
- Just my first IOCTL try☆75Jul 9, 2020Updated 5 years ago