TetteDev / LowLevelMouseHook-Example
[NET5] Shows how to strip injected flags from calls to SendInput/MouseEvent
☆46Updated 3 years ago
Alternatives and similar repositories for LowLevelMouseHook-Example:
Users that are interested in LowLevelMouseHook-Example are comparing it to the libraries listed below
- Hypervisor-assisted internal League of Legends hack☆69Updated 4 years ago
- Spoofer for NtUserSendInput☆38Updated 3 years ago
- ☆29Updated 4 years ago
- I've developed a rather effective driver for DLL injection targeting EAC Protected Games, and since I'm not aware of any notable games ut…☆89Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- ☆56Updated last year
- Based on physmeme☆69Updated 3 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆111Updated 2 years ago
- Calling "own" MouseClassServiceCallback☆68Updated 2 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆69Updated 2 years ago
- Detect if a mouse event injected☆39Updated 7 years ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆52Updated 7 months ago
- ☆47Updated last year
- 🔵 EAC - BE / Kernel Driver 🔵☆87Updated 8 months ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆157Updated last year
- Using CVE-2021-40449 to manual map kernel mode driver☆101Updated 3 years ago
- ☆35Updated 3 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆91Updated 5 years ago
- ☆122Updated 2 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆94Updated 3 years ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆91Updated 11 months ago
- ☆31Updated 2 years ago
- A library to simulate keyboard & mouse inputs using a multitude of different input-methods.☆31Updated last year
- Mid Hook Template (x64) - Easy way to mid function hooking in x64☆34Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- ☆41Updated 3 years ago
- ☆49Updated last year
- Kernel driver that moves the mouse☆69Updated last month
- Uses a driver to read/write process memory☆12Updated 4 years ago