beans42 / kernel-read-write-using-ioctlLinks
☆251Updated 5 years ago
Alternatives and similar repositories for kernel-read-write-using-ioctl
Users that are interested in kernel-read-write-using-ioctl are comparing it to the libraries listed below
Sorting:
- kernel anticheat to test your driver against☆178Updated 6 months ago
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆149Updated 2 months ago
- This is a simple project of a driver + usermode.☆164Updated 3 years ago
- kernel mode spoofer disk and smbios, socket communication☆219Updated 3 years ago
- A simple UM + KM example of how to bypass EAC CR3☆167Updated 2 months ago
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆125Updated 2 months ago
- Kernel mode to user mode dll injection☆293Updated 4 years ago
- Fumo Loader - All in one kernel-based DLL injector☆354Updated 11 months ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆367Updated 4 years ago
- 09/2021 reversal of EasyAntiCheat driver☆230Updated 4 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆184Updated last year
- Drawing from kernelmode without any hooks☆173Updated 3 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆198Updated 3 years ago
- ☆220Updated 3 years ago
- Simple Kernelmode DLL Injector with Manual mapping☆323Updated 2 years ago
- xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, all…☆282Updated last year
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆364Updated 3 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆348Updated 9 months ago
- windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export …☆213Updated last month
- undetected eac mapper☆168Updated 3 years ago
- SetWindowsHookEx Injector☆176Updated 2 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172Updated 3 years ago
- A mapper that maps shellcode into loaded large page drivers☆309Updated 3 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆242Updated 6 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Updated 2 years ago
- A kernel driver for reading and writing memory☆307Updated 2 years ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆183Updated 2 months ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆136Updated last year
- manually map driver for a signed driver memory space☆165Updated 4 years ago
- ☆134Updated 3 years ago