☆16Jun 20, 2022Updated 3 years ago
Alternatives and similar repositories for NtUserUpdateWindowTrackingInfo
Users that are interested in NtUserUpdateWindowTrackingInfo are comparing it to the libraries listed below
Sorting:
- ☆12Jun 30, 2019Updated 6 years ago
- Had this laying around on my Disk☆16Oct 27, 2022Updated 3 years ago
- ☆23Oct 4, 2022Updated 3 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- A project written in C++ to get hardware info on a Windows PC. Interfaces with the Windows Management Instrumentation (WMI) service to qu…☆11Nov 1, 2021Updated 4 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- ☆43Apr 18, 2023Updated 2 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆106Apr 28, 2023Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- ☆158May 21, 2024Updated last year
- Kernel Injector pasted from various different Github repositories.☆21Aug 19, 2019Updated 6 years ago
- ☆20May 17, 2022Updated 3 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- Calling "own" MouseClassServiceCallback☆76Jul 28, 2022Updated 3 years ago
- ☆136Aug 6, 2022Updated 3 years ago
- eac memory sig maker☆14Jun 10, 2021Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆10Jul 26, 2020Updated 5 years ago
- ☆13May 4, 2022Updated 3 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- GameOverlayRenderer64.dll or Steam's overlay renderering software is extremely vulnerable in very many ways, I've decided to reverse engi…☆13Jun 28, 2022Updated 3 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- ☆69Aug 31, 2021Updated 4 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Aug 14, 2021Updated 4 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- ☆20Mar 15, 2023Updated 3 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆387Jan 29, 2022Updated 4 years ago
- anti crack system protector☆108Nov 27, 2023Updated 2 years ago
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆15Feb 14, 2023Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆213Dec 16, 2022Updated 3 years ago
- ☆91Oct 6, 2023Updated 2 years ago
- overwatch2 tope external☆26Jun 18, 2024Updated last year
- A mapper that maps shellcode into loaded large page drivers☆329Apr 26, 2022Updated 3 years ago
- 一个界面基于IMGUI的ARK,目前R3实现☆13Nov 1, 2023Updated 2 years ago
- An other Detected & Pasted driver☆24Jun 30, 2022Updated 3 years ago