PaulFreund / KeyboardTrapLinks
Windows kernel driver for keyboard input manipulation
☆40Updated 10 years ago
Alternatives and similar repositories for KeyboardTrap
Users that are interested in KeyboardTrap are comparing it to the libraries listed below
Sorting:
- force delete runing .exe application file.or delete any locked file☆71Updated 2 years ago
- Windows kernel driver for mouse input manipulation☆39Updated 10 years ago
- ☆49Updated 6 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- ☆47Updated 4 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆44Updated 4 years ago
- Modify process handle permissions☆60Updated 8 years ago
- windows kernel deriver loader(pro)☆47Updated 4 years ago
- Some garbage drivers written for getting started☆65Updated 5 years ago
- Mouse emulation driver for Windows 10 x64☆31Updated 7 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 6 years ago
- A tool to dump informations about the caller of a function.☆13Updated 8 years ago
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆31Updated 8 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆66Updated 6 years ago
- Using C++ STL on Windows kernle development☆88Updated 6 years ago
- Windows tool box library☆65Updated 7 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆20Updated 9 years ago
- A simple library which provides a way to read and write the memory of other processes☆51Updated 7 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Updated 6 years ago
- A Windows game hacking framework☆43Updated 8 years ago
- ☆26Updated 8 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆117Updated 8 years ago
- ☆36Updated 8 years ago
- Pe-protector protects executable files.☆52Updated 3 years ago
- A simple tool to extract the DX11/9 devices hook address.☆34Updated 7 years ago
- Analyze PatchGuard☆58Updated 6 years ago
- Windows Kernel Template Library☆109Updated 2 years ago
- Detect if a mouse event injected☆39Updated 7 years ago
- External cheat base with DirectX overlay☆20Updated 6 years ago