SkarSys / skar-hwid-wooferLinks
a simple kernelmode spoofer that changes all your serialnumbers to any value set from usermode using my own communication method.
☆12Updated last year
Alternatives and similar repositories for skar-hwid-woofer
Users that are interested in skar-hwid-woofer are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- cr3 shuffle driver☆42Updated last year
- IOCTL Dispatch driver to rw mem and more, the last version was used all over the community so i deicded to reamek the usermode (and km ;…☆17Updated 7 months ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆47Updated 10 months ago
- Anti Suspend and Detect Detaching from debuggers.☆14Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆36Updated 7 months ago
- ☆9Updated last year
- ☆41Updated 2 years ago
- ☆30Updated last year
- codecave hook reverse engineering toolkit.☆36Updated last year
- A simple MmCopyMemory hook.☆38Updated 2 years ago
- Made by scammer so i leak for free ! have fun☆55Updated 2 years ago
- Hardware ID☆44Updated 3 years ago
- Header only UM AC "bypass"☆19Updated last year
- Execute anything in a legit memory region by attacking a windows driver☆19Updated last year
- ☆15Updated last year
- POC kernel driver with hidden system thread☆14Updated last year
- ☆17Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆53Updated 8 months ago
- ☆12Updated last year
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆97Updated last year
- communicate with kernel using a image on disk☆15Updated last year
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆20Updated 2 months ago
- simple driver to read and write☆18Updated last month
- Had this laying around on my Disk☆17Updated 2 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆32Updated last year
- Bypass using kernel driver (not finish).☆20Updated 2 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆19Updated 3 years ago
- Driver that communicates using a shared section☆57Updated 2 months ago
- ☆54Updated 2 years ago