Welcome!
Welcome to Styx Library Documentation
Welcome to the official documentation for the Styx Library. This powerful and versatile library provides low-level access to system memory and virtualization features, enabling developers to create sophisticated applications that interact directly with hardware and system resources.
What is Styx?
Styx is a library specifically tailored for bypassing anti-cheat systems at the hypervisor level. It offers a comprehensive suite of tools and functions for:
Memory manipulation at the physical and virtual level
Process information retrieval and modification
Virtual machine management and exploitation
Low-level system interactions and kernel-level operations
Complete concealment of kernel mode drivers
Hiding internal modules within games (internal cheats)
Masking overlay applications from detection
Bypassing anti-cheat mechanisms for both external and internal cheats
Manipulating and intercepting system calls
Altering memory protection and access rights
Injecting and executing code in protected processes
Modifying game memory and logic in real-time
Intercepting and modifying network traffic
Bypassing integrity checks and signature verification
What do we support?
We currently only support Windows 10 22H2 and Windows 11 24H2, also the common Desktop Intel CPUs that supporting VT-x. we don't support officially any Laptop CPUs. So it might work, but it is not guaranteed
Getting started
To begin using Styx, check out our Getting started Guide. This will walk you through the implementation process and provide some basic examples to get you up and running.
API Reference
For detailed information about Styx's functions and data structures, visit our API Reference section.
Last updated