External warzone cheat with manual mapped driver (function hook), overlay (nvidia hijack), simple esp, no recoil



External warzone cheat with manual mapped driver (function hook), overlay (nvidia hijack), simple esp, no recoil

Offsests are NOT up to date

modern wareafee or warzone or blizzardds whatever their anti cheat is not very good ,,... (excpet their hwid bans are pretty anouning) anywayws thier anti cheat is only usemrode so of course our sexy manual mapped drievr will be veyr nice for this game.... the ovrrlay is pretty fine except for the tranprant flag that gets added here since the nvidia overlay deosnt have the transprent flag we add that but that can be alittle suspicouss for the anit cheat since a new flag has been added to a legit window. The top most is taken care of here. So if u really care but its really not a massive deal if ur just poarniod u can find a way to rmeove the transprant flag or hook getwindowlong to reutnr nothing who cares its not worth the effort their anticheat is dog shit actually they also maybe take screenshots too so maybe u should compentsate for that hint hint this or this can help u regarding the WS_EX_TRANSPARENT fkag.

esp is very basic but u can expand it if u want there is a draw box function. no recoil is commented out cuz offset not work but if u want to ad that probaly just create a new thread so esp and recoil are sepreate.

DEL key unoads overlay and cheat.

Compile x64 release, kdmapper driver. Run modern_wareafre_client.exe when in game





  • for the hijacking structure

albxrn for function hook pasta

unkowncheats modern warefare fourm for offsets and decprytion

  • Is this detected and if so what to change

    Is this detected and if so what to change

    On Issue #8 the user uBadRequest said about this project "I ended up getting banned so quick".

    To my understanding Warzone has 'mainly' an userlevel AC, i thought using RPM and WPM through an Kernel should bypass the AC easily, but it looks like iam missing something.

    Is this something basic like the AC detecting this by signature checking or is the AC more capable than i thought?

    Iam reading couple Threads on UC and other sites about Kernel developing but still struggle to understand more complex topics like hiding a Driver from the AC. (Currently Ive only done basic game hacking like a cs go external)

    What would I have to do to make it undetected (only for personal use)?

    opened by vatosyorgos 7
  • What am i doing wrong?

    What am i doing wrong?

    Compiled everything with the offsets that were updated by vinicius and with uc offsets to try but nothing works. The log shows up normally with all of the correct things but no esp in game. I mapped the driver before starting the game and opened modernwarfareclient in a plunder game but nothing actually shows in game.

    opened by Tipsymario3 4
  • There are identical sub-expressions

    There are identical sub-expressions


    it looks like copy paste error, should be probably replaced with:

     return (x == v.x) && (y == v.y) && (z == v.z); 
    opened by thehlopster 1
  • Update offsets.h

    Update offsets.h

    UPDATED: 2022-05-12 VERSION: OFFSETS SOURCE: Unknowncheats Community (https://www.unknowncheats.me/forum/call-of-duty-modern-warfare/355326-call-duty-modern-warfare-213.html) Thanks to ilahigod31, Biellz, carrooo1, SerialGod, KANKOSHEV

    opened by ViniciusFXavier 0
  • Reading Strings

    Reading Strings

    Well i use a super old method driver, and now im follow you project.

    Work correct, but i go into the point i need to read a text, normal i implement this:

    ` template bool read_array(ULONG64 address, T* array, size_t len) { COPY_MEMORY m{}; m.read = true; m.pid = sdk::process_id; m.address = address; m.buffer = &array; m.size = len;

    inline bool readS(uint64_t address, void* buffer, size_t size) {
    	read_array(address, &buffer, sizeof(size_t) * size);
    std::string readwtf(uintptr_t Address, void* Buffer, SIZE_T Size)
    	read_array(Address, Buffer, Size);
    	char name[255] = { 0 };
    	memcpy(&name, Buffer, Size);
    	return std::string(name);


    Did you see any wrong is for UE4 Game on this case, this is how i calle it: ` std::string GNameFromPawn(uint32_t key) { auto chunkOffset = (UINT)((int)(key) >> 16); auto nameOffset = (USHORT)key;

    	auto namePoolChunk = driver::read<UINT64>(module_base + offset_GNames + ((chunkOffset + 2) * 8));
    	auto entryOffset = namePoolChunk + (ULONG)(2 * nameOffset);
    	auto nameEntry = driver::read<INT16>(entryOffset);
    	auto nameLength = nameEntry >> 6;
    	char buff[1028];
    	if ((DWORD)nameLength && nameLength > 0)
    		driver::readS(entryOffset + 2, buff, nameLength);
    		buff[nameLength] = '\0';
    		return std::string(buff);
    	else return "";


    If i no wrong this should work with the memcpy, aside that is same function read (from you project) just expanded to get buffer, and size, is possible what i trying to doe or i just skip?

    opened by NetCKRiters 0
  • WIndowsKernalModeDriver10.0 cannot be found

    WIndowsKernalModeDriver10.0 cannot be found

    I've tried everything but to no avail can I build the solution, I re-target the solution to the correct sdk but I still cannot build due to "WIndowsKernalModeDriver10.0 cannot be found", thanks

    opened by boogieiskool 1
  • Failed to find PID even after using kdmapper to map driver.

    Failed to find PID even after using kdmapper to map driver.

    Issue in title. Using win 21h2 & amd rx 580

    Yes warzone was also opened when I ran the client executable which interacts with the driver, I am not dumb.

    Cheat was compiled from source, kdmapper was compiled from source too and had been used with the .sys first before warzone was opened.

    Any idea what I could try to fix this?

    opened by playingoDEERUX 4
Reproducible example of overlay and overlay mac driver bug

problem It's been observed under certain circumstances that MacOS overlay and overlay2 storage drivers cause the syscall copy_file_range to return zer

David Campion 2 Dec 7, 2021
Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.

CosMapper Loads a signed kernel driver (signed with leaked cert) which allows you to map any driver to kernel mode without any traces of the signed /

null 157 Jan 2, 2023
S6-overlay-helpers - Small binary utilities, specific to s6-overlay

s6-overlay-helpers Small utilities specifically written for s6-overlay. s6-overlay-helpers centralizes all the additional C programs and libraries tha

null 9 Dec 19, 2022
Esp for warzone


Kush Rawal 18 Jun 10, 2021
Internal Warzone Cheat source made by Mondschein#9999

Warzone Cheat A Warzone Internal Cheat Source I found and tested. Works really well How to use the Warzone Internal Cheat [+] - Download it, then comp

xEnething 8 May 31, 2022
external apex legends cheat - esp, chams, rcs

apex legends external cheat external cheat utilizing kernel gdi rendering & kernel key input esp, chams, broken rcs bypass syscall is hooked then call

NMan 62 Dec 31, 2022
Veml7700-esp-idf - VEML7700 Light Sensor driver for ESP-IDF

VEML7700 Light Sensor driver for ESP-IDF Overview This project aims to provide a very simple interface for configuring and reading data from the VEML7

Kristijan Grozdanovski 3 Nov 3, 2022
A dumper for CS:GO cheat loaders that use manual map injection method

NoobDumper v2 A (mostly dll) dumper for CS:GO cheat loaders that use manual map injection method How to use this Inject the dumper into the loader ( x

noobes 22 Jul 21, 2022
Take Damage hook hook made to increase weapon damage, the game I made is Free Fire in version 1.65

Take-Damage Simple Take Damage hook hook made to increase weapon damage, the game I made is Free Fire in version 1.65 Bool bool isTakeDemageBool = fal

Master Games 3 Jan 1, 2022
android analysis tools, jni trace by native hook, libc hook, write log with caller's addr in file or AndroidLog

编译方法 unix like mkdir "build" cd build cmake .. -DNDK=your_ndk_path/Android/sdk/ndk/22.0.7026061 -DANDROID_ABI=armeabi-v7a make -j8 或者使用andriod studio编

pony 63 Dec 1, 2022
A self made HWID Spoofer for Fortnite and Valorant. May also work in Warzone, Apex etc.

HWID-Spoofer A HWID-Spoofer made by me. Tested for Fortnite and Valorant. Really undetected in the moment How to use the Valorant Internal [+] - Downl

gupr0x4 14 Dec 26, 2022
External valorant cheat

vexternal External valorant cheat with imgui (opengl) overlay You have to copy the Roboto-Light.ttf file from the second vexternal folder into your ex

Luca 60 Dec 31, 2022
Rust External Cheat

rust-external-cheat Rust External Cheat neden bu projedesiniz hemen anlatayım; daha type casting nedir bilmeyen pasterların pastelediği sourcedir. tam

Orçun 23 Jun 27, 2022
Apex Legends External Cheat

Apex-Legends-Rage-Cheat Apex Legends External Cheat An Apex Legends External Cheat Source by Ghost#9999 How to use Free Undetected Esp Cheat Apex Lege

gupr0x4 8 Sep 8, 2022
fortnite cheat external that uses efi drivers and is updated

fortnite-external-efi-drivers fortnite cheat external that uses efi drivers and is updated ALL CREDITS TO CHASE: https://github.com/Chase1803 i just u

null 12 Dec 18, 2022
Source Code of "TheGodFather" fortnite external cheat.

mod aka !mod#9659 (ID: 597485373194764311) is a fraud This guy is selling a popular fortnite "Private" External called "GodFather". The cheat that he

ThePasteFather 3 Apr 27, 2022
RC External cheat updated to latest version

Rogue-Company-External-Cheat RC External cheat updated to latest version This cheat will be regularly updated to every update This Cheat won't work on

null 18 Oct 2, 2022
EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode

HOLLOW - Cobalt Strike BOF Authors: Bobby Cooke (@0xBoku) Justin Hamilton (@JTHam0) Octavio Paguaga (@OakTree__) Matt Kingstone (@n00bRage) Beacon Obj

Bobby Cooke 203 Dec 20, 2022
DLL Hijack Search Order Enumeration BOF

DLL Hijack Search Order BOF What is this? This is a Cobalt Strike BOF file, meant to use two arguments (path to begin, and a DLL filename of interest)

null 121 Dec 13, 2022