Calling "own" MouseClassServiceCallback
☆76Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for MouseClassServiceCallbackMeme
Users that are interested in MouseClassServiceCallbackMeme are comparing it to the libraries listed below
Sorting:
- ☆64Sep 28, 2022Updated 3 years ago
- base for testing☆187Sep 28, 2024Updated last year
- ☆34Mar 3, 2024Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆115Dec 28, 2022Updated 3 years ago
- get_module, read/write mem, mouse emulation☆353Sep 1, 2020Updated 5 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- ☆63Jul 31, 2022Updated 3 years ago
- Cool kernel communication method.☆100Jun 27, 2021Updated 4 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- ☆28Jan 6, 2024Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated this week
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆104Jun 26, 2023Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- ☆183May 20, 2022Updated 3 years ago
- scan system / process integrity☆350Oct 22, 2024Updated last year
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- ☆16Jun 20, 2022Updated 3 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- ☆64Aug 31, 2023Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆329Apr 26, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Proof of Concept Kernel-User Communication using System Thread.☆14Sep 24, 2023Updated 2 years ago
- MouClassInputInjection implements a kernel interface for injecting mouse input data packets into the input data stream of HID USB mouse d…☆379Apr 20, 2020Updated 5 years ago
- Kernel driver that moves the mouse☆76Mar 15, 2025Updated last year
- This is a simple project of a driver + usermode.☆169Jan 31, 2022Updated 4 years ago
- ☆158May 21, 2024Updated last year
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- KernelMode GDI Overlay☆27Aug 15, 2025Updated 7 months ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆389Aug 8, 2021Updated 4 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆638Dec 26, 2024Updated last year
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆300Nov 3, 2019Updated 6 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆102Sep 5, 2021Updated 4 years ago
- ☆82Aug 17, 2021Updated 4 years ago