bieljtvz
an eternal apprentice in programming, always wanting more knowledge. Currently looking to know the functionality of kernel executions.
bieljtvz's Stars
DrNseven/D3D11-Wallhack
d3d11 hook x86/x64
NMan1/Rainbow-Six-Cheat
Features a kernel driver - fully functional login loader with a MySQL database - HWID checker - licensing system - r6 cheat features - menu
mactec0/Kernelmode-manual-mapping-through-IAT
Manual mapping without creating any threads, with rw only access
Schnocker/EAC_dbp
EAC Bypass
SamuelTulach/mutante
Kernel-mode Windows HWID spoofer
btbd/hwid
HWID spoofer
breezechen/hdsnspoofer
Hard Disk Serial Number Spoofer on windows. x86/x64 supported.
hfiref0x/KDU
Kernel Driver Utility
btbd/access
Access without a real handle
Dark7oveRR/kdmapper
KDMAPPER build [1809,1903,1909,2004]
Zer0Mem0ry/KernelBhop
Cheat that uses a driver instead WinAPI for Reading / Writing memory.
thesecretclub/CVEAC-2020
EasyAntiCheat Integrity check bypass by mimicking memory changes
wbenny/injdrv
proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC
btbd/wpp
Intercepting DeviceControl via WPP
r1cky33/krnl-gdi-render
ekknod/logitech-cve
10/11/2020
oblitum/Interception
The Interception API aims to build a portable programming interface that allows one to intercept and control a range of input devices.
stormshield/Beholder-Win32
A sample on how to inject a DLL from a kernel driver
decimaldreamer/Battleye-VAC-EAC-Kernel-Bypass
Kernel mode bypass for BattlEye, EAC
tandasat/DdiMon
Monitoring and controlling kernel API calls with stealth hook using EPT
landhb/HideProcess
A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager
iPower/KasperskyHook
Hook system calls on Windows by using Kaspersky's hypervisor