SmKernel use a kernel driver that's make a shared memory communication. Driver have simple cheat functions like get module base and Read/Write in memory.
This project is maded in my free time and i make this very fast so this probably has some bugs.
The project is simpel, i just add a simple triggerbot, just for poc.
Problaly no, because vac don't have a kernel driver that's can detect this feautures.
To make sure it's undetectable you can add obCallBacks to the usermode app, but I don't think it's necessary for such a weak anticheat.
Yes, because I didn't build this driver with security as a priority.
So a kernel anticheat can easily detect this
- Download visual studio 2019
- Install Windows Driver Kit (WDK)
- Download the project
- Open solution and compile for x64
- Put computer on test mode
bcdedit /set testsigning on
- Restart your computer
- Create a service for driver
sc create smk type=kernel binpath="path to driver"
- Start the service
sc start smk