user23333 / HyperVisorInjector
Secure Hyper-Visor Injector for Easy Anti Cheat, Battleye | that supports amd + intel | Undetected + Active updates
☆18Updated 2 years ago
Alternatives and similar repositories for HyperVisorInjector:
Users that are interested in HyperVisorInjector are comparing it to the libraries listed below
- clearing traces of a loaded driver☆46Updated 2 years ago
- ☆30Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆25Updated last year
- ☆53Updated 2 years ago
- POC usermode <=> kernel communication via ALPC.☆53Updated 11 months ago
- Bypass using kernel driver (not finish).☆20Updated 2 years ago
- Mapping your code on a 0x1000 size page☆72Updated 2 years ago
- ☆42Updated 3 years ago
- Old way for blocking NMI interrupts☆26Updated 2 years ago
- Windows Kernel Misc☆23Updated last year
- POC kernel driver with hidden system thread☆14Updated 11 months ago
- Execute anything in a legit memory region by attacking a windows driver☆19Updated last year
- 将驱动映射到会话空间☆34Updated 2 years ago
- page table manipulation to gain physical r/w☆40Updated last year
- Header only UM AC "bypass"☆19Updated last year
- ☆49Updated last year
- A method to Disable DSE using .data ptr hooks☆30Updated last year
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆16Updated 2 years ago
- communicate with kernel using a image on disk☆15Updated last year
- A simple MmCopyMemory hook.☆37Updated 2 years ago
- ☆23Updated 6 months ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- ☆43Updated 10 months ago
- RWX Section Abusing☆17Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆50Updated last year
- ☆47Updated 4 years ago
- ☆21Updated 2 years ago
- Stealing signatures from pe files☆17Updated last month
- ☆78Updated last year