ArmandoA10 / hwid-spoofer
This tool is designed to help gamers bypass hardware bans in various online games by spoofing their hardware identifiers (HWID). With the increasing number of games implementing stringent anti-cheat systems, it's crucial to have reliable tools that allow players to enjoy their gaming experience without the fear of unfair bans.
☆21Updated last month
Related projects ⓘ
Alternatives and complementary repositories for hwid-spoofer
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 5 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆10Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 6 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Tool for obtaining information about PPL processes☆17Updated 9 months ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆12Updated 4 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 3 years ago
- A tool to embed files into images☆11Updated 3 years ago
- A C# Tool to gather information about email breaches☆12Updated 11 months ago
- ☆17Updated 8 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Free Email Providers☆10Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆23Updated 4 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- File integrity monitor proof-of-concept in PowerShell sends a message via Telegram when it detects changes to a specified directory. It c…☆11Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated 7 months ago
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 7 months ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- ☆12Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year