Simulate SendInput with ClassService
☆35Sep 5, 2018Updated 7 years ago
Alternatives and similar repositories for DirectInput
Users that are interested in DirectInput are comparing it to the libraries listed below
Sorting:
- x64 assembler library☆31Jun 7, 2024Updated last year
- comparing data of module exports from disk and memory, then caching any differences.☆26Dec 11, 2021Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- ☆64Sep 28, 2022Updated 3 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- A simple way to spoof return addresses using an exception handler☆44Aug 3, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- ☆20May 17, 2022Updated 3 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Drawing from kernelmode without any hooks☆174Jul 7, 2022Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- Black Signature Driver☆24Oct 20, 2023Updated 2 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- This is a simple project of a driver + usermode.☆170Jan 31, 2022Updated 4 years ago
- A wrapper class to hide the original calling address of a function☆54Aug 9, 2020Updated 5 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- ☆36Mar 19, 2019Updated 7 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆120Mar 30, 2018Updated 7 years ago
- ☆14May 10, 2021Updated 4 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- Libraries written in inline assembly☆19Aug 7, 2023Updated 2 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- ☆24May 17, 2022Updated 3 years ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago