kila58 / qemu-patchedLinks
QEMU patched to avoid detection from various anticheats such as Battleye/EAC
☆85Updated last year
Alternatives and similar repositories for qemu-patched
Users that are interested in qemu-patched are comparing it to the libraries listed below
Sorting:
- This tool Decrypt and Extract the files from the EAC☆77Updated 5 months ago
- Minimal memory library for Windows / Linux☆66Updated last year
- Various IDA scripts I've created for Reverse engineering.☆95Updated last year
- Control your mouse using razer synapse☆94Updated 4 years ago
- A reimplementation of byfrons NO_ACCESS memory protection feature☆61Updated 3 years ago
- Hardware ID☆61Updated 3 years ago
- manually map driver for a signed driver memory space☆170Updated 4 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆199Updated 3 years ago
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆133Updated 4 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆102Updated 4 years ago
- Kernel and Usermode Spoofer for SCP:SL☆55Updated last year
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Updated 5 years ago
- game dumper☆47Updated 5 years ago
- Based on physmeme☆71Updated 3 years ago
- undetected eac mapper☆168Updated 3 years ago
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆130Updated 3 months ago
- ☆75Updated last year
- Example driver on how to use SKLib☆65Updated last year
- csgo external running from kernelmode☆107Updated 3 years ago
- Calling "own" MouseClassServiceCallback☆76Updated 3 years ago
- BattlEye compatible injector, done completely from user-mode.☆54Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆63Updated 3 years ago
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆156Updated 3 months ago
- ☆57Updated 2 years ago
- ☆83Updated last year
- Windows driver mapper via the UEFI☆55Updated 6 months ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Updated 3 years ago
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆34Updated last year
- Kernel driver that moves the mouse☆74Updated 10 months ago
- An imgui window rendered on top of nvidia's overlay with animations☆82Updated 2 years ago