vmcall / ElevateMe
Handle access elevation via direct kernel object manipulation
☆120Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for ElevateMe
- ☆57Updated 7 years ago
- An usermode alternative for DuplicateHandle.☆174Updated 7 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆141Updated 6 years ago
- Auto generated offsets extracted from PUGB SDK to use in external☆56Updated 6 years ago
- BattlEye x64 usermode injector☆62Updated 5 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆218Updated 6 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆413Updated 4 years ago
- An usermode BE Rootkit Bypass☆232Updated 5 years ago
- ☆100Updated 4 years ago
- Player ESP 3D Box ESP Nametag ESP Lightweight Code Secure Injection Dedicated Cheat Launcher Secured Against Battleye Chicken Dinner…☆56Updated last year
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆125Updated 7 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆184Updated 4 years ago
- DLL injector that bypasses some checks for valid certificates.☆36Updated 6 years ago
- ☆182Updated 5 years ago
- x86/x64 manual mapping injector using the JUCE library☆83Updated 4 years ago
- Disable Driver Callbacks☆98Updated 7 years ago
- A collection of source files which help develop mainly external cheats for the game PUBG☆40Updated 6 years ago
- use windows kernel deriver hidden file and itself to Bypass BE☆236Updated last year
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆103Updated 4 years ago
- BattlEye BEClient<->BEService usermode emulator☆79Updated 5 years ago
- Latest version of my personal BF4 Hack☆41Updated 6 years ago