vmcall / ElevateMeLinks
Handle access elevation via direct kernel object manipulation
☆118Updated 7 years ago
Alternatives and similar repositories for ElevateMe
Users that are interested in ElevateMe are comparing it to the libraries listed below
Sorting:
- ☆60Updated 7 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆145Updated 7 years ago
- An usermode alternative for DuplicateHandle.☆176Updated 8 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- x86/x64 manual mapping injector using the JUCE library☆86Updated 5 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆107Updated 4 years ago
- DLL injector that bypasses some checks for valid certificates.☆37Updated 7 years ago
- Lightweight and flexible library to load and communicate with kernel drivers on Windows.☆72Updated last week
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆178Updated 4 years ago
- paladins d3d multihack☆33Updated last year
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆130Updated 8 years ago
- Hiding x32/x64 Modules/DLLs using PEB☆61Updated 10 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 5 years ago
- Auto generated offsets extracted from PUGB SDK to use in external☆56Updated 7 years ago
- Detect manualmapped images remotely, without hassle☆154Updated 7 years ago
- An usermode BE Rootkit Bypass☆238Updated 6 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆417Updated 5 years ago
- Hard Disk Serial Number Spoofer on windows. x86/x64 supported.☆77Updated 7 years ago
- I wanted a nicer signature scanner that worked the way I wanted. Include however you want in your own DLL project.☆45Updated 10 years ago
- A simple tool to extract the DX11/9 devices hook address.☆32Updated 7 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆226Updated 7 years ago
- Player ESP 3D Box ESP Nametag ESP Lightweight Code Secure Injection Dedicated Cheat Launcher Secured Against Battleye Chicken Dinner…☆61Updated 2 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Updated 6 years ago
- ☆102Updated 4 years ago
- Disable Driver Callbacks☆104Updated 7 years ago
- Bypass User Account Control by manipulating tokens☆34Updated 7 years ago
- ☆57Updated 6 years ago
- Test code only. Not suitable for actual use.☆98Updated 10 years ago
- Mono Framework Interaction / Injection Library for .NET (C++/CLI)☆70Updated 7 years ago
- D3D11 Aimbot for Warframe☆56Updated 4 years ago