xtremegamer1 / xigmapperLinks
xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, allowing you to write your bypass without worrying about the intricacies of EFI or the boot process.
☆282Updated last year
Alternatives and similar repositories for xigmapper
Users that are interested in xigmapper are comparing it to the libraries listed below
Sorting:
- A somewhat wide collection of various kernelmode-usermode communication methods in one repository (mainly just for learning purposes).☆381Updated 6 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆364Updated 3 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆349Updated 9 months ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆456Updated 3 years ago
- kernel anticheat to test your driver against☆178Updated 6 months ago
- undetected eac mapper☆168Updated 3 years ago
- kernel mode spoofer disk and smbios, socket communication☆219Updated 3 years ago
- Simple proof of concept showing how you can use Discord's in-game internal module to draw on top of the game (even if the game is in full…☆198Updated 2 years ago
- ☆250Updated 5 years ago
- 09/2021 reversal of EasyAntiCheat driver☆228Updated 3 years ago
- Standard Kernel Library for Windows manipulation in C++☆192Updated 6 months ago
- ☆220Updated 3 years ago
- A kernel driver for reading and writing memory☆307Updated 2 years ago
- update face injector by KANKOSHEV☆284Updated 4 years ago
- This is a simple project of a driver + usermode.☆163Updated 3 years ago
- manually map driver for a signed driver memory space☆164Updated 4 years ago
- Module extending manual mapper☆370Updated 5 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆367Updated 4 years ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆372Updated last year
- ☆259Updated 3 months ago
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆458Updated 2 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆242Updated 6 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆317Updated 4 years ago
- A simple UM + KM example of how to bypass EAC CR3☆167Updated 2 months ago
- get_module, read/write mem, mouse emulation☆341Updated 5 years ago
- Kernel mode to user mode dll injection☆293Updated 4 years ago
- A mapper that maps shellcode into loaded large page drivers☆308Updated 3 years ago
- Just a external cheat source for Fortnite with a kernel driver (using data pointer communication)☆126Updated 2 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆198Updated 3 years ago
- Drawing from kernelmode without any hooks☆173Updated 3 years ago