lguilhermee / Battleye-Shellcode-Dumper
BEClient2.dll Dumper
☆20Updated 4 years ago
Alternatives and similar repositories for Battleye-Shellcode-Dumper:
Users that are interested in Battleye-Shellcode-Dumper are comparing it to the libraries listed below
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- ☆19Updated 4 years ago
- ☆50Updated 5 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆46Updated 4 years ago
- ☆22Updated 3 years ago
- C/C++ example of InjectMouseInput function☆32Updated 4 years ago
- ☆42Updated 3 years ago
- ☆68Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆21Updated 2 years ago
- ☆64Updated 2 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆50Updated last year
- game dumper☆45Updated 4 years ago
- ☆46Updated 3 years ago
- ☆49Updated last year
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆41Updated 4 years ago
- Mapping your code on a 0x1000 size page☆72Updated 2 years ago
- Just my first IOCTL try☆73Updated 4 years ago
- Disk based DMA for ATA and SCSI☆23Updated last year
- ☆46Updated 3 years ago
- driver manual mapper☆28Updated 5 years ago
- Helps to find patched modules☆29Updated 4 years ago
- simple driver to read and write☆18Updated last week
- ☆30Updated 2 years ago
- working injector bp (BE EAC & VANGUARD)☆36Updated 2 years ago
- ☆53Updated 2 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆70Updated 3 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago