Page 1 of 1

Mega advanced tweaking techniques

Posted: 12 Sep 2025, 00:00
by Hyote
see comments

Re: Mega advanced tweaking techniques

Posted: 12 Sep 2025, 17:43
by Hyote
I can't edit the original post now so I'm going to add the working solution here:
https://github.com/Hyyote/files-/blob/m ... l/patch.js

Follow the usage instructions at the start of the file.

Re: Mega advanced tweaking techniques

Posted: 13 Sep 2025, 14:41
by FYNE
Was asking chatgpt for more info about that stuff
Short and sweet: I won't help you run the script on a real machine—because it's exactly the kind of code that can permanently destroy kernel functions, crash systems, or be abused by malware. Even if you want to test it on your own computer, the risk is serious (blue screen, data loss, not always recoverable).

But I'll remain constructive — I'll show you safe alternatives and a harmless “dry run” version of the script that lets you see exactly which debugger commands would be executed without writing anything to the kernel. I'll also explain how to set up a safe test lab (VM + snapshots) if you still want to experiment.
Why I don't support active patching

Overwriting kernel code (RET in critical handshake/interrupt/syscall routines) will most likely render the system unusable.

System restore points are not reliable protection against kernel modifications (snapshots in hypervisor/VM are significantly safer).

Such code is dual-use: it can very easily be incorporated into rootkits/malware — which is why I cannot give you instructions on how to actually do this.

Translated with DeepL.com (free version)
Now Im hooked ngl, reads like black magic

Re: Mega advanced tweaking techniques

Posted: 13 Sep 2025, 16:40
by Hyote
FYNE wrote:
13 Sep 2025, 14:41
Was asking chatgpt for more info about that stuff
Short and sweet: I won't help you run the script on a real machine—because it's exactly the kind of code that can permanently destroy kernel functions, crash systems, or be abused by malware. Even if you want to test it on your own computer, the risk is serious (blue screen, data loss, not always recoverable).

But I'll remain constructive — I'll show you safe alternatives and a harmless “dry run” version of the script that lets you see exactly which debugger commands would be executed without writing anything to the kernel. I'll also explain how to set up a safe test lab (VM + snapshots) if you still want to experiment.
Why I don't support active patching

Overwriting kernel code (RET in critical handshake/interrupt/syscall routines) will most likely render the system unusable.

System restore points are not reliable protection against kernel modifications (snapshots in hypervisor/VM are significantly safer).

Such code is dual-use: it can very easily be incorporated into rootkits/malware — which is why I cannot give you instructions on how to actually do this.

Translated with DeepL.com (free version)
Now Im hooked ngl, reads like black magic
That's why I didn't start explaining the functions in the first place because AI can sum it up pretty well. It's not black magic as we are just looking to stop useless functions for marginal gains but this should serve as an entry to this kind of tweaking.

Re: Mega advanced tweaking techniques

Posted: 14 Sep 2025, 23:02
by Hyote
I still do a lot of tweaking, making custom Windows versions, but most of it is to pass the time. However I started using LiveKd and WinDbg to change some values that couldn't be set with regedit. Unexpectedly some of the settings kind of completely eliminated the infamous floaty mouse feeling. Or more like it's there initially but as I am playing games, I can look around, flick around and it feels completely fine.
So I'll share a quick tutorial with my very limited understanding about how to do this

DISCLAIMER: don't do this if you aren't aware of the risks (pretty much just about getting a bluescreen)

Download and install WinDbg
Download LiveKd and move the .exe files to the WinDbg folder
open CMD and change directory to WinDbg folder with: cd "your\example\path"
livekd64.exe -w
After WinDbg opens up, paste in:
symchk -v C:\Windows\System32\ntoskrnl.exe /s srv*C:\Symbols*https://msdl.microsoft.com/download/symbols

I'm adding a script that automates the changes for the settings below
https://github.com/Hyyote/files-/blob/m ... l/patch.js

Paste into WinDbg:
.scriptload C:\path\to\patch.js
dx @$scriptContents.patchBatch()


This program needs to be running constantly for the settings to be applied.
Here are the ones I use alonside the script:
ed nt!KeQuantumEndTimerIncrement FFFFFFFF
ed nt!KiIdleLoop 90
ed nt!KiQuantumEnd 1
ed nt!KeFeatureBits 0

There's a lot of bs in there still but this is made for anyone who wants to go down different paths of optimization.

Re: Mega advanced tweaking techniques

Posted: 15 Sep 2025, 07:16
Could you please make a ready iso-File version for installing Windows direct?

Re: Mega advanced tweaking techniques

Posted: 15 Sep 2025, 10:59
by Slender
[email protected] wrote:
15 Sep 2025, 07:16
Could you please make a ready iso-File version for installing Windows direct?
+
i can share you ntlite licence if you want it, Hyote.

Re: Mega advanced tweaking techniques

Posted: 15 Sep 2025, 11:30
by Hyote
Even though many people do it, sharing ISOs anywhere is illegal, so I'm not risking that. But the NTLite XML with the files are available here:
https://github.com/Hyyote/files-/tree/m ... ndows%2011

The latest version of 24H2 is 8.5 GB, the created ISO will be reduced to 2.45 GB.
It has some settings preapplied, but I do most other things afterwards.

Re: Mega advanced tweaking techniques

Posted: 15 Sep 2025, 17:31
by jadlr
I am getting a lot of errors when i run script, please help

Code: Select all

[*] Attempting to patch: nt!NtQuerySystemInformation
[*] Single patch mode for: nt!NtQuerySystemInformation
[!] Failed to patch nt!NtQuerySystemInformation. Error: Symbol resolution failed: Command execution failed: ? nt!NtQuerySystemInformation - Unknown exception
[*] Trying alternative approach...
[!] Alternative patch failed: Command execution failed: eb nt!NtQuerySystemInformation c3 - Unknown exception
[!] Possibly invalid symbol, insufficient permissions, or function not accessible.
------------------------------------------------------------
[✓] Batch patch complete. Success: 0, Failed: 9