luciouskami / APEX-EACBypass
APEX-EACBypass(usermode)
☆46Updated 5 years ago
Alternatives and similar repositories for APEX-EACBypass:
Users that are interested in APEX-EACBypass are comparing it to the libraries listed below
- ayy debuger☆88Updated 11 months ago
- Modify process handle permissions☆59Updated 8 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆52Updated 3 years ago
- ☆68Updated 2 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- x64 manual mapper using inline syscalls☆8Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- PUBG Lite SDK External Generator, base on KN4CK3R's UnrealEngineSDKGenerator.☆10Updated 5 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 5 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- dx9 logger imgui hack☆20Updated 4 years ago
- Another method to anti ThreadHideFromDebugger☆35Updated 5 years ago
- 使用vt进行无痕hook,支持r3☆53Updated 6 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆90Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆123Updated 2 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆81Updated 5 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- ☆25Updated 7 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆109Updated 3 years ago
- Process path modification x64☆53Updated 6 years ago
- 玩家不知道战场-超能力感知☆58Updated last year
- noob hooking dwm for overlay☆75Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated last year
- KDMAPPER build [1809,1903,1909,2004]☆70Updated 4 years ago
- A Memory Read And Write the Hide Driver☆65Updated 4 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆70Updated 2 years ago
- first commit☆57Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 2 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆40Updated 9 months ago
- ☆36Updated 7 years ago