xtremegamer1 / xigmapper
xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, allowing you to write your bypass without worrying about the intricacies of EFI or the boot process.
☆248Updated last year
Alternatives and similar repositories for xigmapper:
Users that are interested in xigmapper are comparing it to the libraries listed below
- A somewhat wide collection of various kernelmode-usermode communication methods in one repository (mainly just for learning purposes).☆310Updated 5 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆309Updated 3 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆406Updated 3 years ago
- ☆213Updated 2 years ago
- A kernel driver for reading and writing memory☆282Updated last year
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆312Updated 3 years ago
- undetected eac mapper☆163Updated 2 years ago
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆402Updated 2 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆235Updated 2 weeks ago
- update face injector by KANKOSHEV☆271Updated 3 years ago
- Just a external cheat source for Fortnite with a kernel driver (using data pointer communication)☆112Updated last year
- Kernel anticheat to test your driver against☆146Updated last month
- This is a simple project of a driver + usermode.☆143Updated 3 years ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆370Updated 11 months ago
- Kernel mode to user mode dll injection☆238Updated 3 years ago
- manually map driver for a signed driver memory space☆149Updated 4 years ago
- An Unsigned Driver Mapper for Windows 10 22H2 -> Windows 11 23H2 that uses PdFwKrnl to exploit the Read/Write IOCTL Calls to disable DSE …☆143Updated 6 months ago
- Drawing from kernelmode without any hooks☆162Updated 2 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆242Updated 5 years ago
- ☆148Updated this week
- Simple proof of concept kernel mode driver hooking tpm.sys dispatch to randomize any public key reads☆206Updated last year
- BattlEye shellcodes tester☆140Updated 3 years ago
- ☆260Updated 2 months ago
- kernel mode spoofer disk and smbios, socket communication☆153Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆259Updated 2 years ago
- Module extending manual mapper☆324Updated 4 years ago
- Simple proof of concept showing how you can use Discord's in-game internal module to draw on top of the game (even if the game is in full…☆160Updated last year
- 09/2021 reversal of EasyAntiCheat driver☆212Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆330Updated 2 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆171Updated 2 years ago