memflow / memflow-kvm
Linux kernel module for memflow's KVM connector
☆40Updated 2 months ago
Alternatives and similar repositories for memflow-kvm:
Users that are interested in memflow-kvm are comparing it to the libraries listed below
- memflow plugin for ReClass.NET☆20Updated 7 months ago
- memflow demo project that will dump most internal csgo cheats☆34Updated 4 years ago
- Connector plugin for memflow that enables reading and writing of physical memory in qemu.☆40Updated 11 months ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆79Updated 4 years ago
- A plugin for ReClass.NET to function over a PCIe FPGA device☆38Updated last year
- Minimal memory library for Windows / Linux☆64Updated 10 months ago
- ☆12Updated 3 years ago
- ☆22Updated 5 months ago
- Create and find signatures in Binary Ninja☆27Updated last year
- Windows driver mapper via the UEFI☆45Updated 3 months ago
- Apex Legends external cheat using memflow. Complete with a HTML/CSS menu and webserver☆16Updated 4 years ago
- Kernel module to evade KVM's detection through RDTSC timer☆34Updated 3 years ago
- This tool Decrypt and Extract the files from the EAC☆63Updated last year
- A intel hypervisor, implementing many virtualization techniques☆42Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆50Updated last year
- Simple mmapper which using UEFI runtime driver.☆81Updated 5 years ago
- Discarded Section Manual Map☆65Updated 4 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- memflow connector backend to interface with pcileech devices☆21Updated 7 months ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆123Updated 2 years ago
- manually map driver for a signed driver memory space☆151Updated 4 years ago
- Hypervisor-based debugger for AMD processors☆49Updated 10 months ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆171Updated 2 years ago
- ☆31Updated 7 years ago
- ☆41Updated 5 years ago
- ☆139Updated 4 years ago
- A lightweight BattlEye emulator of the launcher☆60Updated 2 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆81Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- Intercepting DeviceControl via WPP☆131Updated 5 years ago