09/2021 reversal of EasyAntiCheat driver
☆240Dec 21, 2021Updated 4 years ago
Alternatives and similar repositories for EAC-Reversal
Users that are interested in EAC-Reversal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- base for testing☆189Sep 28, 2024Updated last year
- Reversing EasyAntiCheat.☆596Apr 19, 2019Updated 7 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆132Apr 23, 2022Updated 4 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆367Aug 18, 2022Updated 3 years ago
- Code for Battleyes shellcode☆236Nov 11, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- undetected eac mapper☆168May 3, 2022Updated 4 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆103Mar 5, 2022Updated 4 years ago
- A mapper that maps shellcode into loaded large page drivers☆348Apr 26, 2022Updated 4 years ago
- BattlEye shellcodes tester☆153Jan 3, 2022Updated 4 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 4 years ago
- Easy Anti PatchGuard☆221Apr 9, 2021Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Oct 6, 2022Updated 3 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆200Jul 11, 2023Updated 2 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆643Dec 26, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆485Jan 3, 2022Updated 4 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆394Aug 8, 2021Updated 4 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆398Jan 29, 2022Updated 4 years ago
- Drawing from kernelmode without any hooks☆176Jul 7, 2022Updated 3 years ago
- Lightweight Intel VT-x Hypervisor.☆689Dec 17, 2024Updated last year
- Windows kernel anti-cheat for driver integrity testing and security research☆187Jun 16, 2025Updated 10 months ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆149Feb 12, 2022Updated 4 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆566Nov 12, 2022Updated 3 years ago
- ☆158May 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆42Jul 1, 2022Updated 3 years ago
- ☆225Mar 11, 2023Updated 3 years ago
- ☆223May 10, 2022Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆212Aug 18, 2023Updated 2 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆348Apr 27, 2020Updated 6 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Dec 11, 2021Updated 4 years ago
- DLL scatter manual mapper☆821Apr 10, 2021Updated 5 years ago
- nmi stackwalking + module verification☆166Dec 28, 2023Updated 2 years ago
- ☆146Jan 24, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆221Nov 12, 2020Updated 5 years ago
- BattlEye kernel module bypass☆179Oct 1, 2022Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆120Feb 8, 2022Updated 4 years ago
- 🪝 Various EPT hook detection approaches☆148Feb 22, 2026Updated 2 months ago
- ☆192Dec 8, 2021Updated 4 years ago
- Manual mapping without creating any threads, with rw only access☆813Oct 29, 2019Updated 6 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 4 years ago