Skip to content

NMan1/OverflowRust

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overflow Rust

Bypass hooks an imported function inside dxgkrnl.sys. This imported function resides in watchdog.sys, and is called when NtDxgkCreateTrackedWorkload gets called from win32u.dll

NtDxgkCreateTrackedWorkload syscall win32u.dll -> NtDxgkCreateTrackedWorkload dxgkrnl.sys -> (half way through function) WdLogEvent5_WdError watchdog.sys

/

This hook could be detcted if two things occur

  1. If EAC scans watchdog.sys for hooks (%99 doubt they do, its just some random windows non-pg protcted module why would they)
  2. If EAC scans and compares all loaded drivers (doubt too would cause to many false positives probaly?)

To pass the struct I used shared memory. I think the bypass is safe, although the renderering method is probaly not. Method I used to render: https://github.com/thesecretclub/window_hijack

Features:

  • Recoil Control
  • Auto Pistol
  • Spiderman
  • Admin flags
  • ESP
    • Player
    • Scientist
    • Stash

Pictures:

/

Compiling

  1. Right click on "OverflowR6Rust.sln" in the first folder.
  2. Open it in a text editor such as notepad++
  3. Change the directories to where your files are located

Credits:

Releases

No releases published

Packages

No packages published