A Rust-based hardware identifier management tool designed for privacy-conscious gamers and developers. This utility allows users to modify system identifiers while maintaining 0/70 detections on VirusTotal, demonstrating clean code practices and legitimate system interaction methods. Created as a proof-of-concept for hardware privacy.
Status: 0/70 Detections (Clean)
- VirusTotal Report: View Analysis
- SHA-256:
c1e16a1d5ffaef5835e343862520062a118ebf815fe37ab6beac92390881b9bb - File Size: 18.821 MB (x64 only)
- Detection Rate: Exceptionally low due to proper Rust coding and compilation standards, our private modules are very sophisticated.
- System ID Adjustment: Modifies hardware identifiers at multiple system layers
- Network Identifier Randomization: Updates MAC addresses across all adapters
- Storage Serial Management: Handles GPT/MBR disk identifiers with driver-level access
- Component ID Configuration: Manages GPU, CPU, and motherboard identifiers
- Registry Management: System-level registry modifications for ID persistence
Tested in various environments including:
- EasyAntiCheat environments (Fortnite, Apex Legends, Rust)
- Vanguard systems (will likely require additional configuration)
- BattlEye protected titles (Rainbow Six Siege, Escape from Tarkov, PUBG)
- Ricochet implementations (Call of Duty series)
- FACEIT and other competitive platforms (variable success rates)
- Language: Rust with direct system bindings
- Distribution: Statically linked, zero runtime dependencies
- Operation: Kernel-level access, WMI integration, registry management
- Persistence Model: Single execution pattern, no resident processes
- WMI Interface: Communicates with Win32_DiskDrive, Win32_BaseBoard, Win32_BIOS classes
- Registry Layer: Direct HKLM modifications for system identifier management
- Driver Integration: Kernel-level access for persistent storage modifications
- Network Stack: NDIS layer integration for adapter configuration
- PCI System: Hardware descriptor management via SetupAPI
- Evasion Techniques: Advanced pattern management (compiled components)
Core management logic remains open-source on GitHub, while advanced system integration techniques stay compiled to maintain effectiveness against detection systems. This balanced approach allows community auditing while preserving operational integrity.
For optimal compatibility and verification:
- hwidspoof.net - Official distribution with verified checksums
- Security Note: Avoid third-party distributions to ensure file integrity
- GitHub Releases - Source components and documentation
- Compiled binaries include both open and proprietary modules
This project requires specialized build environments due to:
- Complex Cargo dependency graphs
- Custom build toolchains and scripts
- Advanced Rust feature requirements
- Specific compiler optimization profiles
- Multiple private code repositories
Unless experienced with Rust ecosystem and Windows driver development, pre-compiled binaries are recommended.
- Acquire the latest build from hwidspoof.net
- Execute the application
- Load configuration via the interface
- Apply modifications through the management interface
- System restart for full identifier propagation
- Verification using standard system information tools
- Core hardware management framework
- Network adapter randomization modules
- Registry management utilities
- Basic driver interface implementations
- WMI integration framework
- Configuration management system
- Advanced pattern management systems
- Kernel protection system integration
- Temporal algorithm implementations
- Debug/VM environment detection systems
- Signature management techniques
- Driver verification integration
- Operating System: Windows 10 (1909+) or Windows 11 (64-bit)
- Architecture: x64 exclusively
- Runtime: None required (statically compiled)
- Permissions: Administrative privileges for system-level operations
- Some security software may flag system modification tools generically
- Windows Defender may require exception configuration for operation
- Always verify file integrity using provided SHA-256 checksums
- Execute only from trusted sources and original distributions
- Current detection rates remain exceptionally low due to proper coding standards
Developed by gamers for privacy and hardware management. Intended for:
- Hardware privacy management
- System identifier research and development
- Educational purposes in system programming
- Hardware access restoration scenarios
We encourage responsible use that respects gaming ecosystems while protecting user hardware autonomy.
[package]
name = "hardwaretool"
version = "1.4.2"
edition = "2021"
- Execution Time: < 5 seconds for full configuration (including load time)
- Memory Footprint: < 50 MB during active operation
- Persistence Model: Non-resident after execution completion
- System Impact: Targeted registry modifications only
Open source components welcome community input through:
- Issue reporting for public modules
- Documentation improvements and translations
- Build system enhancements
- Cross-platform compatibility adjustments
Advanced system integration components remain proprietary to maintain effectiveness against detection systems.
- Core Framework: MIT License (GitHub repository)
- Advanced Components: Proprietary distribution rights
- Binary Distribution: Free for personal, non-commercial use
- Official Site: hwidspoof.net
- GitHub Repository: github.com/hwspf/hwidtool/
- Security Analysis: VirusTotal Report
- Support Contact: message@hwidspoof.net
For straightforward hardware management:
- Visit hwidspoof.net
- Download the latest release build
- Execute, load configuration profile
- System restart for changes to propagate
- Hardware identifiers are now managed according to configuration
Developed by hardware privacy advocates. Open where practical, effective where needed.