jay's repositories
Full-Hwid-Spoofer-2023
The present offering manifests as a potent and intuitive hardware ID (HWID) spoofer meticulously tailored for the Windows 10 and Windows 11 operating systems. Rigorous testing and successful deployment have ascertained seamless compatibility with both AMD and Intel CPUs and motherboards.
dwm-screen-shot
将shellcode注入dwm.exe以进行屏幕截取
SyscallHook
System call hook for Windows 10 20H1
VmwareHardenedLoader
Vmware Hardened VM detection mitigation loader (anti anti-vm)
Windows10-CustomKernelSigners
Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSigners
bedaisy-reversal
Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.
Detect-KeAttachProcess
Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.
Detect-MouseClassServiceCallback
mouseclassservicecallback detection via hook
HelloIommuPkg
The sample DXE runtime driver demonstrating how to program DMA remapping.
Hwid--Spoofer
🔵 EAC - BE / Kernel Driver 🔵
hwid-spoofer
hwid spoofer source
InfinityHookPro
InfinityHookPro Win7 -> Win11 latest
inline_syscall
Inline syscalls made easy for windows on clang
LowLevelMouseHook-Example
[NET5] Shows how to strip injected flags from calls to SendInput/MouseEvent
MemoryDll-DllRedirect
Dll memory redirection through Hook NtMapViewOfSection
MouClassInputInjection
MouClassInputInjection implements a kernel interface for injecting mouse input data packets into the input data stream of HID USB mouse devices.
Nmi-Callback
detect hypervisor with Nmi Callback
PEBS_l3set
This tool takes advantage of Intel PEBS (Precise Event-Based Sampling) to collect memory reference trace for target program and then generates MRC (Miss Ratio Curve)
ValorantExternal
Bypass valorant page guard external
vt-debuuger
a debugger use vt technology
wechat-chatgpt
Use ChatGPT On Wechat via wechaty