vmcall / ElevateMe
Handle access elevation via direct kernel object manipulation
☆120Updated 6 years ago
Alternatives and similar repositories for ElevateMe:
Users that are interested in ElevateMe are comparing it to the libraries listed below
- An usermode alternative for DuplicateHandle.☆175Updated 7 years ago
- ☆58Updated 7 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆142Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆220Updated 7 years ago
- BattlEye x64 usermode injector☆64Updated 5 years ago
- Auto generated offsets extracted from PUGB SDK to use in external☆56Updated 6 years ago
- ☆100Updated 4 years ago
- An usermode BE Rootkit Bypass☆234Updated 5 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆413Updated 5 years ago
- Lightweight and flexible library to load and communicate with kernel drivers on Windows.☆75Updated 9 months ago
- ☆184Updated 5 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆183Updated 4 years ago
- driver mapper / capcom wrapper☆217Updated 5 years ago
- x86/x64 manual mapping injector using the JUCE library☆83Updated 4 years ago
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆78Updated 6 years ago
- Player ESP 3D Box ESP Nametag ESP Lightweight Code Secure Injection Dedicated Cheat Launcher Secured Against Battleye Chicken Dinner…☆56Updated last year
- BattlEye BEClient<->BEService usermode emulator☆80Updated 5 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆105Updated 4 years ago
- Disable Driver Callbacks☆99Updated 7 years ago