This tool Decrypt and Extract the files from the EAC
☆86Feb 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for EAC-Extractor-Utility
Users that are interested in EAC-Extractor-Utility are comparing it to the libraries listed below
Sorting:
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- BEClient2.dll Dumper☆22Jul 9, 2020Updated 5 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- ☆63Jul 31, 2022Updated 3 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- ☆47Jul 7, 2024Updated last year
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Jan 2, 2020Updated 6 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆42Jul 1, 2022Updated 3 years ago
- A mapper that maps shellcode into loaded large page drivers☆324Apr 26, 2022Updated 3 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- ☆145Dec 10, 2022Updated 3 years ago
- Internal Cheat for Dark and Darker ( removed some features I was in the process of improving, but I got bored so never re-added them ) En…☆17Sep 14, 2023Updated 2 years ago
- A small tool for rapid enumeration of CPUID, and MSR fields.☆32Jan 30, 2024Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆105Apr 28, 2023Updated 2 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆235Dec 21, 2021Updated 4 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- Drawing from kernelmode without any hooks☆174Jul 7, 2022Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- nmi stackwalking + module verification☆163Dec 28, 2023Updated 2 years ago
- BattlEye shellcodes tester☆151Jan 3, 2022Updated 4 years ago
- ☆136Aug 6, 2022Updated 3 years ago
- ☆36Mar 27, 2022Updated 3 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- x86-64 Automated test data generator☆26Aug 18, 2025Updated 6 months ago
- Analyzing the driver and internal module of EasyAntiCheat.☆40May 1, 2023Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- Lightweight Intel VT-x Hypervisor.☆663Dec 17, 2024Updated last year
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- ☆40Mar 23, 2023Updated 2 years ago
- A devirtualization engine for Themida.☆107Mar 2, 2024Updated 2 years ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- Using CVE-2023-21768 to manual map kernel mode driver☆197Mar 10, 2023Updated 2 years ago