byte2mov / codecave-hook
codecave hook reverse engineering toolkit.
☆37Updated last year
Alternatives and similar repositories for codecave-hook:
Users that are interested in codecave-hook are comparing it to the libraries listed below
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆41Updated 5 months ago
- ☆44Updated last month
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆31Updated 4 months ago
- ☆56Updated last year
- ☆73Updated 10 months ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆26Updated last year
- An Undetected BE Kernel Driver I developed, Will probably be detected upon releasing this but can be made undetected very easily. Does no…☆71Updated 5 months ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆82Updated 9 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆31Updated 11 months ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆14Updated 3 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆68Updated 2 years ago
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆76Updated 11 months ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆46Updated 5 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆45Updated 8 months ago
- A kernel injector for EAC and BE☆93Updated 10 months ago
- ntoskrnl .data hooks for UM-KM communication☆36Updated 9 months ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆58Updated 6 months ago
- DSE & PG bypass via BYOVD attack☆43Updated 11 months ago
- manual map unsigned driver over signed memory☆186Updated 11 months ago
- a simple kernelmode spoofer that changes all your serialnumbers to any value set from usermode using my own communication method.☆13Updated 10 months ago
- The sequel to Voyager☆40Updated 6 months ago
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆86Updated 5 months ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆104Updated 5 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆30Updated 4 months ago
- Undetected DLL Injection Method☆36Updated last year
- PoC kernel to usermode injection☆80Updated last year
- Fully working kernel-mode VAC bypass☆59Updated 3 weeks ago
- This is my BE / EAC / VGK DSE Exploit that is used in my Driver Mapper for Valorant & FaceIT (But also works on BE/EAC)☆52Updated 6 months ago
- IOCTL Dispatch driver to rw mem and more, the last version was used all over the community so i deicded to reamek the usermode (and km ;…☆18Updated 4 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year