☆45Jun 9, 2021Updated 4 years ago
Alternatives and similar repositories for mouse-input-injection
Users that are interested in mouse-input-injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 18, 2021Updated 4 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- Virtual machine with a custom instruction set in C☆16Jul 17, 2018Updated 7 years ago
- Exploit MsIo vulnerable driver☆129Aug 12, 2021Updated 4 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- .lib file for linking against the NT CRT☆19Mar 18, 2022Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- Use ci.dll API for validating Authenticode signature of files☆168Mar 28, 2022Updated 3 years ago
- A method to Disable DSE using .data ptr hooks☆40Feb 1, 2024Updated 2 years ago
- ☆29Aug 3, 2024Updated last year
- capcom-like executor for any physmem driver☆57Jan 6, 2022Updated 4 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- ☆16Feb 11, 2022Updated 4 years ago
- Lightweight Intel VT-x Hypervisor.☆672Dec 17, 2024Updated last year
- Simple driver loader for windows☆18May 22, 2020Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆158Nov 14, 2021Updated 4 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆103Mar 5, 2022Updated 4 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆35Jul 19, 2021Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆271Aug 31, 2022Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆58Sep 12, 2019Updated 6 years ago
- ☆44Jul 11, 2023Updated 2 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- ☆14Mar 8, 2019Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Bypassing EAC integrity checks by abusing a TOCTOU in Dead by Daylight.☆22Jan 9, 2021Updated 5 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- Based on physmeme☆74Apr 30, 2022Updated 3 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆236Apr 2, 2022Updated 3 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Mar 18, 2019Updated 7 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- PE-Dump-Fixer☆111Mar 17, 2020Updated 6 years ago
- ☆27Oct 18, 2023Updated 2 years ago