xtremegamer1 / xigmapperLinks
xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, allowing you to write your bypass without worrying about the intricacies of EFI or the boot process.
☆276Updated last year
Alternatives and similar repositories for xigmapper
Users that are interested in xigmapper are comparing it to the libraries listed below
Sorting:
- A somewhat wide collection of various kernelmode-usermode communication methods in one repository (mainly just for learning purposes).☆377Updated 6 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆345Updated 9 months ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆360Updated 3 years ago
- kernel anticheat to test your driver against☆179Updated 5 months ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆450Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆227Updated 3 years ago
- This is a simple project of a driver + usermode.☆164Updated 3 years ago
- Module extending manual mapper☆366Updated 5 years ago
- kernel mode spoofer disk and smbios, socket communication☆219Updated 3 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆317Updated 4 years ago
- ☆257Updated 3 months ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆374Updated last year
- ☆219Updated 3 years ago
- ☆246Updated 5 years ago
- manually map driver for a signed driver memory space☆163Updated 4 years ago
- undetected eac mapper☆167Updated 3 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆360Updated 4 years ago
- A mapper that maps shellcode into loaded large page drivers☆307Updated 3 years ago
- System Management Mode (SMM) game cheating framework☆260Updated last week
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆455Updated 2 years ago
- A simple UM + KM example of how to bypass EAC CR3☆162Updated last month
- Standard Kernel Library for Windows manipulation in C++☆187Updated 5 months ago
- A kernel driver for reading and writing memory☆308Updated 2 years ago
- Simple proof of concept showing how you can use Discord's in-game internal module to draw on top of the game (even if the game is in full…☆196Updated 2 years ago
- get_module, read/write mem, mouse emulation☆339Updated 5 years ago
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆151Updated 2 months ago
- Kernel mode to user mode dll injection☆292Updated 4 years ago
- scan system / process integrity☆342Updated last year
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆240Updated 6 years ago
- Drawing from kernelmode without any hooks☆173Updated 3 years ago