KANKOSHEV / EASY-HWID-SPOOFER
基于内核模式的硬件信息欺骗工具
☆10Updated 3 years ago
Alternatives and similar repositories for EASY-HWID-SPOOFER:
Users that are interested in EASY-HWID-SPOOFER are comparing it to the libraries listed below
- ☆19Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆21Updated 2 years ago
- Windows Kernel Misc☆23Updated last year
- ☆18Updated 4 years ago
- ☆27Updated last year
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- ☆40Updated 3 years ago
- ☆45Updated 2 years ago
- C/C++ example of InjectMouseInput function☆31Updated 3 years ago
- fecurity executor from factory☆33Updated 2 years ago
- ☆44Updated 4 years ago
- ☆50Updated 2 years ago
- ☆35Updated 4 years ago
- ☆47Updated last year
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- x64 manual mapper using inline syscalls☆7Updated 3 years ago
- ☆31Updated 2 years ago
- Written in a couple hours, don't judge :)☆14Updated last year
- 将驱动映射到会话空间☆33Updated 2 years ago
- ☆33Updated 2 years ago
- Hiding a system thread against conventional means of detection☆37Updated 4 years ago
- clearing traces of a loaded driver☆46Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- ☆47Updated 2 years ago
- ☆24Updated last year
- Disable NMI Callbacks with Kernelmode Driver☆15Updated last year
- ☆22Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Bypass using kernel driver (not finish).☆19Updated last year