ccman32 / WMISpooferLinks
THIS PROJECT IS DISCONTINUED! WMISpoofer allows you to spoof information which other applications read from the Windows Management Instrumentation (WMI).
☆60Updated 8 years ago
Alternatives and similar repositories for WMISpoofer
Users that are interested in WMISpoofer are comparing it to the libraries listed below
Sorting:
- A simple open source memory hooking library for Windows x86/x64☆87Updated 4 years ago
- StrongVM is a virtualizing protector for .NET applications.☆29Updated 2 years ago
- fix vmprotect import function used unicorn-engine.☆96Updated 2 years ago
- Dump .net assembly from a native loader which uses ClrCreateinstance☆57Updated 2 years ago
- Lightweight and flexible library to load and communicate with kernel drivers on Windows.☆73Updated 3 months ago
- Noninvasive debugging plugin for X64Dbg☆106Updated 9 months ago
- ☆50Updated 6 years ago
- A simple open source module injector library x86/x64 for Windows☆21Updated 5 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆105Updated 6 years ago
- disable most common windowsx64 systems patchguard☆88Updated 6 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- Mono Framework Interaction / Injection Library for .NET (C++/CLI)☆70Updated 7 years ago
- A deobfuscator for overwatch's obfuscation.☆36Updated 4 years ago
- Global DLL injector☆68Updated 4 years ago
- A simple to use, gui based program for patching .NET assemblies☆40Updated 3 years ago
- A small virtualizer for .NET which works together with ConfuserEx☆65Updated 6 years ago
- Anti Cheat i made in my free time. Credits to everyone who helped are in the files and some are in the code. I will definitely improve th…☆55Updated 7 years ago
- PE-Dump-Fixer☆111Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆67Updated 2 years ago
- Inject a .NET assembly into a native process using the CLR Hosting API☆21Updated 7 years ago
- x64 syscall caller in C++.☆91Updated 7 years ago
- Simple NtQuerySystemInformation hook for your hacking apps.☆43Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆12Updated 5 years ago
- windows kernel deriver loader(pro)☆47Updated 4 years ago
- Detect if a mouse event injected☆39Updated 8 years ago
- Basic example of how to change the initial rights on a memory region during runtime.☆43Updated last year
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆91Updated 2 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆130Updated 8 years ago
- force delete runing .exe application file.or delete any locked file☆73Updated 2 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆52Updated 4 years ago