- Status
- Offline
- Joined
- Mar 3, 2026
- Messages
- 170
- Reaction score
- 7
Anyone else deep-diving into kernel internals for Valorant/VGK bypasses lately?
Been experimenting with driver development and got stuck on MmCopyVirtualMemory. I know the basics, but looking for some peer review on how this handles memory protections and if there's a cleaner way to handle writes without the standard attach methods.
Here is what I am currently wrestling with:
The goal is to avoid KeStackAttach entirely since it is a massive red flag for any decent kernel-mode monitor. I am trying to keep the footprint as small as possible to avoid those lovely manual bans and shadowbans that Riot loves to hand out.
If anyone has experience with custom drivers or has a more efficient way to handle memory operations for internal/external projects, drop a hint. Are you guys still relying on MmCopyVirtualMemory for your loaders, or have you moved to something more obscure to stay UD?
Let me know if anyone has tested a direct physical write method that does not require an attach. Also, curious to hear if anyone has successfully bypassed VGK's page protection hooks lately.
Been experimenting with driver development and got stuck on MmCopyVirtualMemory. I know the basics, but looking for some peer review on how this handles memory protections and if there's a cleaner way to handle writes without the standard attach methods.
Here is what I am currently wrestling with:
- Protection Respect: Does MmCopyVirtualMemory strictly adhere to page protections like PAGE_READONLY? It seems like it does. If that is the case, isn't any write operation to user-mode memory inherently noisy? If I am flipping bits in a protected page, the target process (or an anticheat monitor) is going to see those page state changes immediately. How are you guys handling write-access without triggering these alerts?
- No-Attach Write: I have been looking at the "read memory without attach" approach—super solid for reading, but is there a reliable way to replicate this for writes? MmCopyMemory usually maps the target address as user-mode, which makes physical-side writing a pain. If I am using a DMA setup or a custom driver, is there a bypass for the KeStackAttach overhead when performing writes, or are we stuck with the attach-and-pray method for now?
The goal is to avoid KeStackAttach entirely since it is a massive red flag for any decent kernel-mode monitor. I am trying to keep the footprint as small as possible to avoid those lovely manual bans and shadowbans that Riot loves to hand out.
If anyone has experience with custom drivers or has a more efficient way to handle memory operations for internal/external projects, drop a hint. Are you guys still relying on MmCopyVirtualMemory for your loaders, or have you moved to something more obscure to stay UD?
Let me know if anyone has tested a direct physical write method that does not require an attach. Also, curious to hear if anyone has successfully bypassed VGK's page protection hooks lately.