xtremegamer1 / xigmapperLinks
xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, allowing you to write your bypass without worrying about the intricacies of EFI or the boot process.
☆272Updated last year
Alternatives and similar repositories for xigmapper
Users that are interested in xigmapper are comparing it to the libraries listed below
Sorting:
- A somewhat wide collection of various kernelmode-usermode communication methods in one repository (mainly just for learning purposes).☆369Updated 6 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆360Updated 3 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆447Updated 3 years ago
- kernel anticheat to test your driver against☆178Updated 4 months ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆373Updated last year
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆353Updated 4 years ago
- kernel mode spoofer disk and smbios, socket communication☆215Updated 2 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆333Updated 8 months ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆241Updated 6 years ago
- ☆216Updated 3 years ago
- A kernel driver for reading and writing memory☆303Updated 2 years ago
- Module extending manual mapper☆356Updated 5 years ago
- This is a simple project of a driver + usermode.☆162Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆222Updated 3 years ago
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆450Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆306Updated 3 years ago
- Kernel mode to user mode dll injection☆287Updated 4 years ago
- undetected eac mapper☆163Updated 3 years ago
- ☆235Updated 5 years ago
- get_module, read/write mem, mouse emulation☆332Updated 5 years ago
- ☆131Updated 3 years ago
- ☆253Updated last month
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆313Updated 4 years ago
- update face injector by KANKOSHEV☆279Updated 3 years ago
- Simple proof of concept showing how you can use Discord's in-game internal module to draw on top of the game (even if the game is in full…☆185Updated 2 years ago
- manually map driver for a signed driver memory space☆161Updated 4 years ago
- Fumo Loader - All in one kernel-based DLL injector☆336Updated 9 months ago
- BattlEye shellcodes tester☆148Updated 3 years ago
- A simple UM + KM example of how to bypass EAC CR3☆159Updated last week
- Kernel mode driver for reading/writing process memory. C/Win32.☆301Updated 7 years ago