is it only me or there's someone else can write process mem without any bypass?
no u
I dont think this works
Code:HWND hWnd = FindWindowA(0, ("BlackShot")); GetWindowThreadProcessId(hWnd, &pid); HANDLE pHandle = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pid); WriteProcessMemory(pHandle, (LPVOID)Addr, &Value, sizeof(Addr), 0); std::cout << "[+] cula.\n"; system("pause");
There is a lot of vulnerable drivers can be exploitable as evaluating handles, load unsigned drivers, wpm/rpm, Physical read/write, etc.
who isn't lazy, surely have it done already.