mlghuskie / NoBastianView external linksLinks
NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass
☆147Jun 17, 2018Updated 7 years ago
Alternatives and similar repositories for NoBastian
Users that are interested in NoBastian are comparing it to the libraries listed below
Sorting:
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆417Jan 3, 2020Updated 6 years ago
- driver mapper / capcom wrapper☆228Oct 29, 2019Updated 6 years ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- An usermode BE Rootkit Bypass☆240May 1, 2019Updated 6 years ago
- BattlEye Emulator, modified from slicktors work.☆14Nov 27, 2018Updated 7 years ago
- An usermode alternative for DuplicateHandle.☆177Aug 12, 2017Updated 8 years ago
- ☆27Oct 16, 2017Updated 8 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆180Nov 5, 2020Updated 5 years ago
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Yet Another Sig Scanner☆34Jul 18, 2018Updated 7 years ago
- just an lite AntiRootkit for interesting☆24Dec 9, 2015Updated 10 years ago
- DLL injector that bypasses some checks for valid certificates.☆37Apr 25, 2018Updated 7 years ago
- A library to manipulate physical memory from usermode.☆303Sep 5, 2023Updated 2 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 5 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆118Mar 30, 2018Updated 7 years ago
- windows kernelmode and usermode IAT hook☆149Mar 9, 2021Updated 4 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- Handle access elevation via direct kernel object manipulation☆118Jan 26, 2018Updated 8 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Mar 8, 2020Updated 5 years ago
- D3D11 Worldtoscreen Finder, dx11 w2s, d3d11 w2s, esp, world to screen☆342Nov 26, 2024Updated last year
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Nov 7, 2019Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆228Nov 24, 2017Updated 8 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆111Aug 10, 2020Updated 5 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆107Nov 5, 2020Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- x64 usermode rootkit☆211Apr 11, 2018Updated 7 years ago
- VAC2 Emulator & VAC3 Response Parser☆84May 10, 2017Updated 8 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- windows create process with a dll load first time via LdrHook☆31Oct 21, 2016Updated 9 years ago
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago