crowbar-team / vmp-import-resolverLinks
VMProtect 3.5+ dynamic import resolver
☆19Updated last year
Alternatives and similar repositories for vmp-import-resolver
Users that are interested in vmp-import-resolver are comparing it to the libraries listed below
Sorting:
- ☆63Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆102Updated 2 years ago
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆84Updated 4 months ago
- ☆83Updated last year
- POC usermode <=> kernel communication via ALPC.☆70Updated last year
- ☆36Updated 3 years ago
- Example driver on how to use SKLib☆67Updated last year
- ☆90Updated 2 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆50Updated 4 months ago
- just proof of concept. hooking MmCopyMemory PG safe.☆81Updated 2 years ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆70Updated 4 months ago
- ☆28Updated last month
- bypass to the p2c(s) that I have run over the past few months.☆55Updated 3 years ago
- I've developed a rather effective driver for DLL injection targeting EAC Protected Games, and since i dont care for any notable games uti…☆103Updated last year
- page table manipulation to gain physical r/w☆43Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆56Updated last year
- driver that communicates using a shared section☆86Updated 10 months ago
- IoCreateDriver Implementation, it can be useful if you're trying to bypass anticheats☆122Updated 2 months ago
- ☆59Updated 2 years ago
- Kernel Level NMI Callback Blocker☆157Updated 4 months ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆95Updated 4 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆105Updated 2 years ago
- ☆70Updated 4 years ago
- ☆49Updated 3 years ago
- ☆19Updated last year
- Library to manipulate drivers that expose a physical memory read/write primitive.☆38Updated 2 years ago
- A simple MmCopyMemory hook.☆37Updated 3 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆72Updated last year
- A simple ida python script to find .data ptr☆58Updated 2 years ago