vmcall / battleye_emulation
BattlEye BEClient<->BEService usermode emulator
☆79Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for battleye_emulation
- BattlEye x64 usermode injector☆62Updated 5 years ago
- driver mapper / capcom wrapper☆215Updated 5 years ago
- ☆44Updated 5 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆108Updated 6 years ago
- Intercepting DeviceControl via WPP☆127Updated 5 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- A customizable process dumper.☆129Updated 5 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆141Updated 6 years ago
- Disable Driver Callbacks☆98Updated 7 years ago
- ☆68Updated 4 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆160Updated 4 years ago
- Hooking kernel functions by abusing alignment☆238Updated 3 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆54Updated 5 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆103Updated 4 years ago
- ☆182Updated 5 years ago
- ☆139Updated 3 years ago
- manually map driver for a signed driver memory space☆138Updated 3 years ago
- ☆160Updated 7 years ago
- Apex Legends QEMU Cheat☆52Updated 4 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆74Updated 6 years ago
- Just my first IOCTL try☆70Updated 4 years ago
- r0akmap is a PoC driver manual mapper based on r0ak☆39Updated 6 years ago
- ☆64Updated 5 years ago
- A library to read physical memory and system-wide virtual memory.☆122Updated 6 years ago
- ☆153Updated 5 years ago