Content-Length: 273654 | pFad | http://github.com/gmh5225/CallMeWin32kDriver

8D GitHub - gmh5225/CallMeWin32kDriver: Load your driver like win32k.sys
Skip to content

gmh5225/CallMeWin32kDriver

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CallMeWin32kDriver

Load your driver like win32k.sys

Q`NXJ7G@89G@K)6~5H8JA@6

~MF %CSVW(FCL8H1G4UJ@6Y

Motivation

This feature was analyzed from a certain PUBG cheat driver.

What it can do?

  • Protection against direct dump by Anti-Rootkit tools
  • Bypass MmCopyMemory
  • Hide world does not trigger PG

How to detect?

  • Attach a GUI process before using MmCopyMemory

Compile

  • Visual Studio 2022 & WDK10
  • llvm-msvc [link]

Some discussions on UnknownCheats

https://www.unknowncheats.me/forum/anti-cheat-bypass/511107-load-driver-win32k-sys.html









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/gmh5225/CallMeWin32kDriver

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy