zouxianyu / BlindEye
BattlEye kernel module bypass
☆147Updated last year
Related projects: ⓘ
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆188Updated 3 years ago
- ☆155Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆116Updated 2 years ago
- base for testing☆146Updated this week
- ☆93Updated this week
- ☆131Updated 2 years ago
- Drawing from kernelmode without any hooks☆154Updated 2 years ago
- ☆155Updated last year
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆260Updated 3 years ago
- undetected eac mapper☆161Updated 2 years ago
- ☆130Updated 7 months ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆108Updated 2 years ago
- ☆180Updated last year
- r/w virtual memory without attach☆144Updated 11 months ago
- 09/2021 reversal of EasyAntiCheat driver☆194Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆140Updated last year
- Check your detection vectors☆132Updated last year
- Kernel dwm render☆120Updated 11 months ago
- ☆145Updated 3 months ago
- ☆207Updated 2 years ago
- BattlEye shellcodes tester☆133Updated 2 years ago
- ☆138Updated 3 years ago
- Code for Battleyes shellcode☆201Updated 2 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆241Updated 4 years ago
- Kernel Lazy Importer☆107Updated 5 months ago
- A mapper that maps shellcode into loaded large page drivers☆215Updated 2 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆108Updated last week
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆100Updated last year
- Easy Anti PatchGuard☆212Updated 3 years ago
- ☆115Updated 2 years ago