niemand-sec / ReClass.NET-DriverReader
Plugin for ReClass.Net (using vulnerable driver to read process memory)
β89Updated 4 years ago
Related projects β
Alternatives and complementary repositories for ReClass.NET-DriverReader
- π₯windows memory library aimed towards game hackingβ39Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserModeβ84Updated 5 years ago
- External Il2Cpp Frameworkβ57Updated 3 years ago
- β52Updated 4 years ago
- x64 manual mapper using inline syscallsβ5Updated 3 years ago
- manually map driver for a signed driver memory spaceβ138Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.β77Updated 3 years ago
- driver manual mapperβ26Updated 4 years ago
- β66Updated 3 years ago
- β83Updated last year
- Kernel Lazy Importerβ111Updated 7 months ago
- Proof of concept on how to bypass some limitations of a manual mapped driverβ164Updated 4 years ago
- β33Updated 2 years ago
- undetected eac mapperβ163Updated 2 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheatβ67Updated last year
- β64Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.β110Updated 2 years ago
- Hide external overlay by using SetWindowDisplayAffinityβ87Updated 3 years ago
- Hypervisor-assisted internal League of Legends hackβ67Updated 4 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisyβ59Updated 4 years ago
- β139Updated 3 years ago
- Just my first IOCTL tryβ70Updated 4 years ago
- β68Updated 4 years ago
- a minimalistic windows hypervisor for amd processorsβ98Updated 2 years ago
- Known ring3 memory protections that can be handled at a simple level.β62Updated last year
- Iterate FUObjectArray->ObjObjects & FNamePool->Entriesβ36Updated 2 years ago