Some usefull info when reverse engineering Kernel Mode Anti-Cheat
☆78Feb 20, 2023Updated 3 years ago
Alternatives and similar repositories for KMAC
Users that are interested in KMAC are comparing it to the libraries listed below
Sorting:
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Mar 16, 2021Updated 4 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- ☆16Mar 1, 2019Updated 7 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- ☆14Mar 8, 2019Updated 6 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- 09/2021 reversal of EasyAntiCheat driver☆235Dec 21, 2021Updated 4 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆116Aug 10, 2020Updated 5 years ago
- Example of making debugger using Hardware Breakpoint + VEH☆18May 13, 2021Updated 4 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- An anti-cheat project that includes kernel mode.☆39Jul 29, 2021Updated 4 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Jul 6, 2018Updated 7 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- Library containing Anti-RE and Anti-Debug methods.☆119Apr 30, 2025Updated 10 months ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Sep 12, 2022Updated 3 years ago
- ☆75Dec 17, 2019Updated 6 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- C/C++ Runtime library for system file (Windows Kernel Driver) - Supports Microsoft STL☆192Aug 27, 2022Updated 3 years ago
- 反外挂☆86Oct 23, 2019Updated 6 years ago
- Single header code that sets any section's page to No Access☆11Feb 15, 2022Updated 4 years ago