Bypass hooks an imported function inside dxgkrnl.sys
. This imported function resides in watchdog.sys
, and is called when NtDxgkCreateTrackedWorkload gets called from win32u.dll
NtDxgkCreateTrackedWorkload syscall win32u.dll -> NtDxgkCreateTrackedWorkload dxgkrnl.sys -> (half way through function) WdLenter image description hereogEvent5_WdError watchdog.sys
[enter image description here][2]
This hook could be detcted if two things occur
- If EAC scans watchdog.sys for hooks (%99 doubt they do, its just some random windows non-pg protcted module why would they)
- If EACscans and compares all loaded drivers (doubt too would cause to many false positives probaly?) To pass the struct I used shared memory. I think the bypass is safe, although the renderering method is probaly not. Method I used to render: https://github.com/thesecretclub/window_hijack
- . Features:
- Recoil Control
- Auto Pistol
- Spiderman
- Admin flags
- ESP
- Player
- Scientist
- Stash
- Compiling
-
Right click on "OverflowR6Rust.sln" in the first folder.
-
Open it in a text editor such as notepad++
-
Change the directories to where your files are located
- Credits:
- Me
- Window Hijacking https://github.com/thesecretclub/window_hijack
- Hooking class/library: https://github.com/adrianyy/kernelhook
Aucun commentaire:
Enregistrer un commentaire