sysfiles's repositories
2D-Injector
Hiding unsigned DLL inside a signed DLL
GooseGooseDuckDLL
我铁好人 真的
Alcatraz
x64 binary obfuscator
Cpp2IL
Work-in-progress tool to reverse unity's IL2CPP toolchain.
cs2-dumper
Counter-Strike 2 Offset Dumper
CVE-2021-44852
An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.
GDRVLib
Virtual and physical memory hacking library using gigabyte vulnerable driver
Goose-Goose-Goose
Free cheat for goose goose duck
Goose_Goose_Duck_Hack
External Hack for Goose Goose Duck. 鹅鸭杀外部辅助
HyperVisor-Injector
SAFE and Easy To Use Hyper-Visor Injector for Easy Anti Cheat, Battleye | that supports amd + intel | Undetected + Active updates
Kernel-Special-APC-ReadProcessMemory
Example of reading process memory through kernel special APC
modded-voyager
bypass to the p2c(s) that I have run over the past few months.
nullmap
Using CVE-2023-21768 to manual map kernel mode driver
NVDrv
Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.
ReadPhys
r/w virtual memory without attach
RwxMeme
State of the art DLL injector that took 20 minutes to make
SafeCall
An x86 Windows, header only library for changing the _ReturnAddress location of a function.
VDM
Library to manipulate drivers that expose a physical memory read/write primitive.