aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorToni Uhlig <matzeton@googlemail.com>2019-06-16 20:08:30 +0200
committerToni Uhlig <matzeton@googlemail.com>2019-06-16 20:08:30 +0200
commitec5dee69505629711fa00f67087986fe2c539023 (patch)
tree6c1be8e2f3089faf775aefe6a1f5202640d95f9b /README.md
parent64ec2dab5f71793d62524cf07096224f08232b6f (diff)
added README.md
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'README.md')
-rw-r--r--README.md24
1 files changed, 24 insertions, 0 deletions
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..909d436
--- /dev/null
+++ b/README.md
@@ -0,0 +1,24 @@
+# What?
+*KMemDriver* is a **Windows 10 x64 driver** designed to manipulate memory (and more)
+from ring0. It is also possible to bypass existing ring0/ring3 AntiCheat solutions e.g. BE and EAC.
+
+
+# Dependencies
+- Visual Studio 2017 Community Edition
+- Windows 10 x64 1803 (may work on older versions, not verified)
+- Windows 10 SDK 10.0.17763.0
+- Windows Driver Kit
+- Windows Universal CRT SDK
+- C++/CLI support
+- VC++ 2017 tools
+
+The recommended way to install all dependencies is through [vs_community.exe](https://visualstudio.microsoft.com/).
+
+
+# HowTo
+*KMemDriver* was designed work together with *PastDSE* as injector.
+*KMemDriver* supports manual mapping.
+
+
+# Contributors
+As you can see, I've used some slightly modified code from [BlackBone](https://github.com/DarthTon/Blackbone) for VAD routines.