vRare / AutoSpitta-x64
Mouse emulation driver for Windows 10 x64
☆31Updated 7 years ago
Alternatives and similar repositories for AutoSpitta-x64:
Users that are interested in AutoSpitta-x64 are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- windows kernel-mode driver, provide memory reading & writing, mini-filters, obCallbacks☆9Updated 5 years ago
- Modify process handle permissions☆59Updated 8 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- ☆25Updated 7 years ago
- by others☆38Updated 7 years ago
- Kernel Inject Process☆11Updated 7 years ago
- An ark tool's driver☆40Updated 7 years ago
- Players' Unknown Battleground Vulnerabilities Test PoC☆18Updated 5 years ago
- ☆35Updated 4 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- My take on the capcom driver vulnerability☆27Updated 7 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Shareds for kernel developement☆27Updated 11 years ago
- ☆48Updated 6 years ago
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆12Updated 5 years ago
- A tool to dump informations about the caller of a function.☆12Updated 8 years ago
- bypass CRC☆11Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 10 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- NT reversal☆25Updated 6 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆14Updated 5 years ago
- ☆14Updated 6 years ago
- Disable Driver Callbacks☆9Updated 7 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Updated 10 years ago
- Wrapper for VMProtect Library (only MSVC)☆36Updated 6 years ago
- D3D/DirectX Model recognition values for multiple games, used to create wallhack or chams☆24Updated 7 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago