What this does is prevent applications from accessing the target process you select. You can’t even terminate it with task manager. This is achieved using callbacks in the kernel. It denies most of these access rights.https://msdn.microsoft.com/en-us/library/windows/desktop/ms684880(v=vs.85).aspx
I made a video about this the a while ago, I posted it on another website so i’ll slap it here as well. Someone told me they used it on a detected cheat and haven’t been banned from VAC (cs go), which is a good sign. All the files are signed with my digital signature so there’s no need to circumvent driver signature enforcement. This will only work on 64bit.
Place the corresponding .sys file into the root of your C drive, then just use the launcher. It’s fairly straight forward. Be sure to push delete to unload the driver before closing the launcher!
Unfortunately, I won’t be supporting Windows 10. If you want the source code PM me, i’ll maybe send it to you depending on who you are.
not sure how that name got on there.
Virus scan you ask? do it yourself.