sysfiles

sysfiles

Geek Repo

Company:nullptr

Location:nullptr

Home Page:nullptr

Twitter:@nullptr

Github PK Tool:Github PK Tool

sysfiles's repositories

2D-Injector

Hiding unsigned DLL inside a signed DLL

Language:CStargazers:1Issues:0Issues:0

apexbot

Apex Legends external cheat for UnKnoWnCheaTs in C++

Language:RustLicense:NOASSERTIONStargazers:1Issues:0Issues:0

GooseGooseDuckDLL

我铁好人 真的

Language:C++License:MITStargazers:1Issues:0Issues:0

Alcatraz

x64 binary obfuscator

Language:C++Stargazers:0Issues:0Issues:0
Language:CLicense:AGPL-3.0Stargazers:0Issues:0Issues:0

Cpp2IL

Work-in-progress tool to reverse unity's IL2CPP toolchain.

Language:C#License:MITStargazers:0Issues:0Issues:0

cs2-dumper

Counter-Strike 2 Offset Dumper

Language:RustLicense:MITStargazers:0Issues:0Issues:0

CVE-2021-44852

An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.

Language:CStargazers:0Issues:0Issues:0
Language:CStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

GDRVLib

Virtual and physical memory hacking library using gigabyte vulnerable driver

Language:C++Stargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0

Goose-Goose-Goose

Free cheat for goose goose duck

Language:C++License:MITStargazers:0Issues:0Issues:0

Goose_Goose_Duck_Hack

External Hack for Goose Goose Duck. 鹅鸭杀外部辅助

Language:C++Stargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0

HyperVisor-Injector

SAFE and Easy To Use Hyper-Visor Injector for Easy Anti Cheat, Battleye | that supports amd + intel | Undetected + Active updates

Language:CStargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0
Language:CStargazers:0Issues:0Issues:0

Kernel-Special-APC-ReadProcessMemory

Example of reading process memory through kernel special APC

Language:CStargazers:0Issues:0Issues:0
Language:CStargazers:0Issues:0Issues:0

modded-voyager

bypass to the p2c(s) that I have run over the past few months.

Language:CStargazers:0Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0

nullmap

Using CVE-2023-21768 to manual map kernel mode driver

Language:CStargazers:0Issues:0Issues:0

NVDrv

Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.

Language:C++Stargazers:0Issues:0Issues:0

ReadPhys

r/w virtual memory without attach

Language:C++License:GPL-3.0Stargazers:0Issues:0Issues:0

RwxMeme

State of the art DLL injector that took 20 minutes to make

Language:C++License:MITStargazers:0Issues:0Issues:0

SafeCall

An x86 Windows, header only library for changing the _ReturnAddress location of a function.

Language:C++License:MITStargazers:0Issues:0Issues:0

VDM

Library to manipulate drivers that expose a physical memory read/write primitive.

Language:C++License:AGPL-3.0Stargazers:0Issues:0Issues:0