diff options
author | Toni Uhlig <matzeton@googlemail.com> | 2019-06-16 20:08:30 +0200 |
---|---|---|
committer | Toni Uhlig <matzeton@googlemail.com> | 2019-06-16 20:08:30 +0200 |
commit | ec5dee69505629711fa00f67087986fe2c539023 (patch) | |
tree | 6c1be8e2f3089faf775aefe6a1f5202640d95f9b /README.md | |
parent | 64ec2dab5f71793d62524cf07096224f08232b6f (diff) |
added README.md
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/README.md b/README.md new file mode 100644 index 0000000..909d436 --- /dev/null +++ b/README.md @@ -0,0 +1,24 @@ +# What? +*KMemDriver* is a **Windows 10 x64 driver** designed to manipulate memory (and more) +from ring0. It is also possible to bypass existing ring0/ring3 AntiCheat solutions e.g. BE and EAC. + + +# Dependencies +- Visual Studio 2017 Community Edition +- Windows 10 x64 1803 (may work on older versions, not verified) +- Windows 10 SDK 10.0.17763.0 +- Windows Driver Kit +- Windows Universal CRT SDK +- C++/CLI support +- VC++ 2017 tools + +The recommended way to install all dependencies is through [vs_community.exe](https://visualstudio.microsoft.com/). + + +# HowTo +*KMemDriver* was designed work together with *PastDSE* as injector. +*KMemDriver* supports manual mapping. + + +# Contributors +As you can see, I've used some slightly modified code from [BlackBone](https://github.com/DarthTon/Blackbone) for VAD routines. |