vmcall / loadlibrayy
x64 manualmapper with kernel elevation and thread hijacking capabilities
☆413Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for loadlibrayy
- An usermode alternative for DuplicateHandle.☆174Updated 7 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆218Updated 6 years ago
- driver manual mapper (outdated/for educational purposes)☆98Updated 5 years ago
- An usermode BE Rootkit Bypass☆232Updated 5 years ago
- Reversing EasyAntiCheat.☆521Updated 5 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆275Updated 8 years ago
- driver mapper / capcom wrapper☆215Updated 5 years ago
- A library to manipulate physical memory from usermode.☆292Updated last year
- Windows kernel samples☆247Updated 5 years ago
- Windows x64 Driver Signature Enforcement Overrider☆718Updated 5 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆563Updated 5 years ago
- Cheat that uses a driver instead WinAPI for Reading / Writing memory.☆743Updated 3 years ago
- C++17 PE manualmapper☆259Updated 3 years ago
- A library to read/write memory to Windows on KVM☆265Updated 4 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆506Updated 5 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆282Updated 6 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆141Updated 6 years ago
- BattlEye compatible injector, done completely from user-mode, project by secret.club☆237Updated 4 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆184Updated 4 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆449Updated 5 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆415Updated 6 years ago
- DLL scatter manual mapper☆726Updated 3 years ago
- Rendering on external windows via hijacking thread contexts☆378Updated 4 years ago
- use windows kernel deriver hidden file and itself to Bypass BE☆236Updated last year
- Literally, the perfect injector.☆866Updated last year
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆845Updated 5 years ago
- Hide Driver By MiProcessLoaderEntry☆281Updated 5 years ago
- Manual mapping without creating any threads, with rw only access☆697Updated 5 years ago