Kernel driver чит

Обновлено: 18.05.2024

A Kernel driver for using against anti cheats like EAC or BE

Releases

No releases published

Packages 0

No packages published

About

A Kernel driver for using against anti cheats like EAC or BE

Resources

Languages

  • © 2021 GitHub, Inc.

You can’t perform that action at this time.

You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.

Simple WDM kernel mode driver for handling read/write memory requests into arbitrary processes.

Kernel based anti-cheat drivers (EAC, BattleEye) block or monitor requests for interfacing with the memory from the game process. The simplest way to bypass anti-cheat protections from the kernel is to use your own kernel mode driver.

  1. Install Visual Studio.
  2. Install the Windows Driver Kit.
  3. Set the solution configuration to x64 and Release and build the solution.

For practical use you will need a driver signing certificate. For development purposes you can enable test-signing mode.

You will need to either install and run the driver as a service with CreateService or use a function like NtLoadDriver . Once the driver is loaded, you can open a handle to the driver:

To issue read or write requests, you send the driver a control code:

The target and source parameters should be reversed if issuing a write request.

Читайте также: