vic4key / Cat-Driver
CatDriver - The Kernel Mode Driver that written in C++. It is an useful driver and has the highest privilege level on the Windows platform. It can be used for Game Hacking and others.
☆65Updated 4 years ago
Alternatives and similar repositories for Cat-Driver:
Users that are interested in Cat-Driver are comparing it to the libraries listed below
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- Disable Driver Callbacks☆102Updated 7 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆75Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- windows kernel deriver loader(pro)☆46Updated 4 years ago
- Manual PE image mapper☆64Updated 11 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- Communication via callback☆73Updated 5 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 5 years ago
- ☆37Updated 7 years ago
- ☆90Updated last year
- Another method to anti ThreadHideFromDebugger☆35Updated 6 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆82Updated 4 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆81Updated 5 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- APEX-EACBypass(usermode)☆46Updated 6 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 3 years ago
- ☆48Updated 6 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 5 years ago
- Intercepting DeviceControl via WPP☆131Updated 5 years ago
- BetaShield Windows x86 Ring3 Anticheat v2☆38Updated 8 years ago
- ☆49Updated 5 years ago
- x64 syscall caller in C++.☆87Updated 6 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆112Updated 3 years ago
- LSASS INJECTOR☆35Updated 6 years ago