Valthrun / valthrun-uefi-mapper
Windows driver mapper via the UEFI
☆37Updated 4 months ago
Related projects: ⓘ
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆47Updated 5 months ago
- ☆35Updated 2 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆31Updated 2 months ago
- just proof of concept. hooking MmCopyMemory PG safe.☆60Updated 10 months ago
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆33Updated 3 weeks ago
- A simple ida python script to find .data ptr☆44Updated last year
- A lightweight BattlEye emulator of the launcher☆57Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆69Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆75Updated last year
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆51Updated last month
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆48Updated 2 years ago
- ☆46Updated last year
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆39Updated 3 weeks ago
- nmi stackwalking + module verification☆78Updated 8 months ago
- A simple kernel driver for R/W Using kSockets with some bypass implementation overall I wouldn't say its "ud"☆28Updated 3 weeks ago
- A library to assist with memory & code protection.☆53Updated 6 months ago
- ntoskrnl .data hooks for UM-KM communication☆33Updated 3 months ago
- A simple MmCopyMemory hook.☆32Updated 2 years ago
- ☆63Updated 4 months ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆77Updated last year
- A method to Disable DSE using .data ptr hooks☆23Updated 7 months ago
- Mapping your code on a 0x1000 size page☆66Updated 2 years ago
- Standard Kernel Library for Windows hacking in C++☆57Updated last month
- Kernel ReClassEx☆58Updated 9 months ago
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- ☆42Updated 2 years ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆30Updated 3 weeks ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆29Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆29Updated 5 months ago
- clearing traces of a loaded driver☆45Updated 2 years ago