oakboat / RTCore64_Vulnerability
Use RTCore64 to map your driver on windows 11.
☆95Updated 9 months ago
Alternatives and similar repositories for RTCore64_Vulnerability:
Users that are interested in RTCore64_Vulnerability are comparing it to the libraries listed below
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆39Updated 8 months ago
- 从MmPfnData中枚举进程和页目录基址☆153Updated last year
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆113Updated 7 months ago
- 运行GsDriver的ring3程序☆41Updated 7 months ago
- ☆127Updated 2 years ago
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆66Updated 9 months ago
- I've developed a rather effective driver for DLL injection targeting EAC Protected Games, and since I'm not aware of any notable games ut…☆87Updated 8 months ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆108Updated 2 years ago
- DWM Overlay without modify .text☆59Updated 4 months ago
- Example of reading process memory through kernel special APC☆101Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆162Updated last year
- An Unsigned Driver Mapper for Windows 10 22H2 -> Windows 11 23H2 that uses PdFwKrnl to exploit the Read/Write IOCTL Calls to disable DSE …☆112Updated 4 months ago
- ☆134Updated 11 months ago
- ☆152Updated 7 months ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆90Updated 4 months ago
- A library to assist with memory & code protection.☆53Updated 10 months ago
- ☆68Updated 2 years ago
- ☆177Updated last year
- ☆71Updated 8 months ago
- ☆30Updated 3 months ago
- A simple UM + KM example of how to bypass EAC CR3☆102Updated this week
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆82Updated last year
- ☆46Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- ☆146Updated 2 years ago
- Kernel driver that moves the mouse☆67Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆69Updated 2 years ago
- A Memory Read And Write the Hide Driver☆65Updated 4 years ago