C/C++ example of InjectMouseInput function
☆35Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for InjectMouseInputExample
Users that are interested in InjectMouseInputExample are comparing it to the libraries listed below
Sorting:
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- External Function Calling Tutorial - Invoker☆16Jan 12, 2021Updated 5 years ago
- A wrapper class to hide the original calling address of a function☆55Aug 9, 2020Updated 5 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆102Sep 5, 2021Updated 4 years ago
- VTIL command line utility☆27Feb 1, 2022Updated 4 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- using gpuz to load driver☆36Mar 14, 2019Updated 6 years ago
- VM1 is an external, unique, pattern/AOB/signature scanner for Windows made with ImGui in C++ by 1hAck. It works for both 64-bit and 32-bi…☆20Nov 6, 2021Updated 4 years ago
- If you made it in here I have no clue how, well hi☆13Apr 10, 2022Updated 3 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- ☆63Sep 28, 2022Updated 3 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆15Feb 14, 2023Updated 3 years ago
- Example Windows Kernel-mode Driver which finds process ID by executable file name.☆18Nov 23, 2019Updated 6 years ago
- Discarded Section Manual Map☆68Jun 18, 2020Updated 5 years ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- Compileable POC of namazso's x64 return address spoofer.☆50Jun 10, 2020Updated 5 years ago
- ☆82Mar 20, 2022Updated 3 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- ☆36Mar 27, 2022Updated 3 years ago
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- ☆38Nov 30, 2022Updated 3 years ago
- A minimalistic way to spoof return addresses without using exceptions☆17Jul 26, 2022Updated 3 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- ☆58Mar 14, 2023Updated 2 years ago
- A simple MmCopyMemory hook.☆38Jul 11, 2022Updated 3 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- ☆27Jan 6, 2024Updated 2 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- base for testing☆186Sep 28, 2024Updated last year
- ☆15Oct 7, 2020Updated 5 years ago
- ☆146Jan 13, 2021Updated 5 years ago
- ☆82Aug 17, 2021Updated 4 years ago