Posted
I've been working on this driver for the past day or so, it's fully functional and perfect for any basic read/write operations you'll engage in.
It communicates with user-mode applications via IOCTL ( Input/Output Control ), with decent logging.
Here's a basic read operation which reads the MZ signature on a test process ( Assault Cube ).
https://media.discordapp.net/attachments/959333771247779860/1033821384444497960/unknown.png
Note: This isn't mean to bypass any anti-cheats, it's simply something I made as a learning experience and I have to say I'm proud with the outcome. The current code base is pretty good, but I'll be polishing it for release on github and here. I'll release this once I use it to make a basic assault cube ammo hack as little test. All-in-all, I hope this will be a learning experience for anyone trying to demystify kernel mode drivers or drivers in general or for anyone who just wants to understand how it's done.
If you have any questions feel free to ask below!
P.S: After this release, a lot of my releases will probably be kernel-related or cheat-related. I haven't made any github releases in a while and I think it's time I change that. If you have suggestions just contact me at expr#6408.
Added
@68729
fax
kernel based cheats are not full-proof.
Cancel
Post
https://media.discordapp.net/attachments/1044764388546068510/1051935933836050482/Signature_4.png
Random quote here...
Replied
@59576
say you don't recommend something -> doesn't recommend an alternative
:shrug:
Cancel
Post
https://media.discordapp.net/attachments/1044764388546068510/1051935933836050482/Signature_4.png
Users viewing this thread:
( Members: 0, Guests: 1, Total: 1 )
Cancel
Post