mathisvickie / KMAC
Some usefull info when reverse engineering Kernel Mode Anti-Cheat
☆66Updated last year
Related projects: ⓘ
- ☆53Updated this week
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆77Updated last year
- ☆46Updated last year
- ☆33Updated 2 years ago
- x64 manual mapper using inline syscalls☆6Updated 3 years ago
- A lightweight BattlEye emulator of the launcher☆57Updated 2 years ago
- A proof of concept demonstrating communication via mapped shared memory structures between a user-mode process and a kernel-mode payload …☆73Updated 3 years ago
- Discarded Section Manual Map☆65Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆81Updated 5 years ago
- ☆53Updated 4 years ago
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆48Updated 2 years ago
- ☆62Updated this week
- ☆40Updated 2 years ago
- ☆46Updated last year
- ☆76Updated 3 years ago
- bypass to the p2c(s) that I have run over the past few months.☆51Updated last year
- Hiding a system thread against conventional means of detection☆34Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆63Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆69Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆38Updated 6 months ago
- ☆41Updated this week
- ☆30Updated 2 years ago
- a minimalistic windows hypervisor for amd processors☆96Updated 2 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- A library to assist with memory & code protection.☆53Updated 6 months ago
- Mapping your code on a 0x1000 size page☆66Updated 2 years ago
- ☆93Updated this week
- ☆48Updated 9 months ago
- Dumping processes using a kernel-mode driver.☆15Updated 2 years ago
- This tool Decrypt and Extract the files from the EAC☆61Updated last year