PaulFreund / MouseTrapLinks
Windows kernel driver for mouse input manipulation
☆40Updated 11 years ago
Alternatives and similar repositories for MouseTrap
Users that are interested in MouseTrap are comparing it to the libraries listed below
Sorting:
- Mouse emulation driver for Windows 10 x64☆30Updated 8 years ago
- Windows kernel driver for keyboard input manipulation☆47Updated 10 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆21Updated 9 years ago
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆32Updated 9 years ago
- An ark tool's driver☆40Updated 8 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆47Updated 4 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 8 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 7 years ago
- A tool to dump informations about the caller of a function.☆13Updated 9 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27Updated 11 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Updated 11 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Updated 7 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Updated 3 years ago
- Windows tool box library☆66Updated 8 years ago
- Shareds for kernel developement☆29Updated 12 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆25Updated 8 years ago
- Spoof Windows Test Signing Mode☆29Updated 7 years ago
- by others☆39Updated 7 years ago
- x64 Kernel Hooks Detection☆24Updated 9 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆25Updated 9 years ago
- ☆39Updated 5 years ago
- ☆44Updated 7 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 11 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆24Updated 11 months ago
- ☆36Updated 8 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Updated 6 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Updated 11 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Updated 10 years ago
- Modify process handle permissions☆62Updated 9 years ago