noahware / darken-anticheatLinks
Kernel anti-cheat for protecting software.
☆94Updated last month
Alternatives and similar repositories for darken-anticheat
Users that are interested in darken-anticheat are comparing it to the libraries listed below
Sorting:
- Kernel Level NMI Callback Blocker☆130Updated last month
- Fully working kernel-mode VAC bypass☆84Updated 9 months ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆82Updated last month
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆63Updated last month
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆180Updated last year
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆122Updated last month
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆132Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆51Updated last year
- Fortnite External Leak Undetected EasyAntiCheat 2024 blabla black people☆47Updated last year
- ☆84Updated last year
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆174Updated last month
- A kernel injector for EAC and BE☆139Updated last year
- anti crack system protector☆100Updated last year
- ☆47Updated 9 months ago
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆100Updated last year
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆144Updated last month
- load unsigned kernel-driver by patching dse in 248 lines☆134Updated last year
- a always updated and undetected temp spoof driver☆27Updated 7 months ago
- C/C++ antidebugging library for Windows☆42Updated last week
- Kernel and Usermode Spoofer for SCP:SL☆52Updated last year
- ☆61Updated 2 years ago
- The sequel to Voyager☆82Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆33Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆206Updated 9 months ago
- State of the art DLL injector that took 20 minutes to make☆221Updated 2 years ago
- manual map unsigned driver over signed memory☆206Updated last year
- nmi stackwalking + module verification☆149Updated last year
- ☆69Updated last year
- Hardware ID☆55Updated 3 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Updated 3 years ago