☆35Jun 13, 2020Updated 5 years ago
Alternatives and similar repositories for BEClient2
Users that are interested in BEClient2 are comparing it to the libraries listed below
Sorting:
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- battleye shellcode☆18Jan 10, 2020Updated 6 years ago
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆17Apr 30, 2020Updated 5 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆86Apr 25, 2019Updated 6 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- web based cloud menu for cheats☆17Oct 27, 2020Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 3 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Modmap updated to work on Windows 11☆28Jul 30, 2021Updated 4 years ago
- ☆185May 5, 2019Updated 6 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- ayy debuger☆89Mar 3, 2024Updated 2 years ago
- ☆15Oct 24, 2020Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Aug 31, 2023Updated 2 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- A wrapper class to hide the original calling address of a function☆55Aug 9, 2020Updated 5 years ago
- Tiny Visual C++ library/example that allows you to inject CoreCLR (the .NET Core Runtime) into the current unmanaged process and execute …☆27Jul 13, 2020Updated 5 years ago
- ☆47Nov 26, 2020Updated 5 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- BattlEye shellcodes tester☆151Jan 3, 2022Updated 4 years ago
- 滥用cow机制进行全局注入☆99Jan 1, 2021Updated 5 years ago
- map driver to memory☆26Aug 26, 2018Updated 7 years ago
- ☆111Nov 13, 2023Updated 2 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Nov 30, 2017Updated 8 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Sep 2, 2018Updated 7 years ago