Git Product home page Git Product logo

master's Introduction

DD 虚拟鼠标 & 虚拟键盘
DD Virtual Mouse & Virtual Keyboard

Discord: ddxoft

Tlg: https://t.me/ddxoft

QQ群: 984539184

paypal.me/cnwz

The free version will be authenticated online when loading

2

 

6个DD通用函数说明:

1. DD_btn(int btn)
功能: 鼠标点击
参数:
1 =左键按下 ,2 =左键放开
4 =右键按下 ,8 =右键放开
16 =中键按下 ,32 =中键放开
64 =4键按下 ,128 =4键放开
256 =5键按下 ,512 =5键放开
例子:
模拟鼠标右键 只需要连写(中间可添加延迟)
dd_btn(4); dd_btn(8);

2. DD_mov(int x, int y)
功能: 鼠标绝对移动
参数:
x , y 以屏幕左上角为原点。
例子:
把鼠标移动到分辨率1920*1080 的屏幕正中间,
int x = 1920/2 ; int y = 1080/2;
DD_mov(x,y) ;

3. DD_movR(int dx,int dy)
功能: 模拟鼠标相对移动
参数:
dx , dy 以当前坐标为原点。
例子:
把鼠标向左移动10像素
DD_movR(-10,0) ;

4. DD_whl(int whl)
功能: 模拟鼠标滚轮
参数:
1=前 , 2 = 后
例子:
向前滚一格,
DD_whl(1)

5. DD_key(int ddcode,int flag)
功能: 键盘按键
参数:
ddcode参考[DD虚拟键盘码表]。
flag,1=按下,2=放开
例子:
单键WIN,
DD_key(601, 1);
DD_key(601, 2);
组合键:ctrl+alt+del
DD_key(600,1);
DD_key(602,1);
DD_key(706,1);
DD_key(706,2);
DD_key(602,2);
DD_key(600,2);

6. DD_str(char *str)
功能: 直接输入键盘上可见字符和空格
参数: 单字节字符串
例子:
DD_str("[email protected] !@#$")

 

master's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

master's Issues

Contact

Possible way of contacting you?

There is error

I try run, but it says this error. Can you help?

Thanks.
error

DD驱动指令丢失

你好作者,我想向您请教一个问题,我的程序如果调用DD指令太快会导致某些指令丢失,如何解决这个问题;还有一个问题,simple,general,hid三种不同驱动有什么区别

Contact

QQ is not available.
I want to buy offline version

这东西不太对劲呀?

为什么断开网络之后运行就会提示“网络问题,稍后再试”。。请问这个还需要联网的吗?不会有后门什么的吧

How to Contact

Hi, i want to talk to you private do you gmail or discord

It does not work in java

I have tried your examples, I have not found a way to run it in java. Can you make a new example for Java?

windows10环境中在休眠和睡眠状态下有问题

windows10 2004,amd4500u的cpu,安装后,休眠和睡眠均无法正常唤醒系统,并且系统会自动重启,后经过查询,是因为引发了蓝屏,休眠后再唤醒触发的蓝屏代码0x000000da,错误信息system_pte_misuse,睡眠后再唤醒触发的蓝屏代码0x00000044,错误信息multiple_irp_complete_requests

驱动启动错误

image
When I check with the Device Manager, the driver is installed well, but when I run the example code with Python, I get an error in driver operation and testSelf in the same folder as dll. If you run with 64, you will get DD initialization error. What can I do to solve it?

作为设备管理员,驱动程序安装得很好,如果用Python 执行预制代码,驱动程序就会出现错误,与dll在同一文件夹中的TestSelf。如果运行64, 将会显示DD初始化错误 。 怎样才能解决呢?

DD_str issues

when DD_str is used, it only types the first character.

for example, DD_str("class") results in "c", although it should be "class".

can you tell me the solution? thanks.

Win10 ddhid1906 Blue Screen ERROR

Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\MPC\Desktop\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff8011ba00000 PsLoadedModuleList = 0xfffff8011c62a270
Debug session time: Thu Apr 7 15:01:58.628 2022 (UTC + 9:00)
System Uptime: 0 days 15:27:52.392
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols

Loading unloaded module list
...................
For analysis of this file, run !analyze -v
3: kd> !analyze -v


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011bc869f9, The address that the exception occurred at
Arg3: ffffbd0e01e3e908, Exception Record Address
Arg4: ffffbd0e01e3e140, Context Record Address

Debugging Details:

Unable to load image \SystemRoot\System32\drivers\DDHID1906.sys, Win32 error 0n2

KEY_VALUES_STRING: 1

Key  : AV.Dereference
Value: NullPtr

Key  : AV.Fault
Value: Read

Key  : Analysis.CPU.mSec
Value: 4640

Key  : Analysis.DebugAnalysisManager
Value: Create

Key  : Analysis.Elapsed.mSec
Value: 16875

Key  : Analysis.Init.CPU.mSec
Value: 2796

Key  : Analysis.Init.Elapsed.mSec
Value: 17682

Key  : Analysis.Memory.CommitPeak.Mb
Value: 87

Key  : WER.OS.Branch
Value: vb_release

Key  : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key  : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011bc869f9

BUGCHECK_P3: ffffbd0e01e3e908

BUGCHECK_P4: ffffbd0e01e3e140

EXCEPTION_RECORD: ffffbd0e01e3e908 -- (.exr 0xffffbd0e01e3e908)
ExceptionAddress: fffff8011bc869f9 (nt!KeSetEvent+0x0000000000000009)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

CONTEXT: ffffbd0e01e3e140 -- (.cxr 0xffffbd0e01e3e140)
rax=0000000000000000 rbx=ffffab0bf6df3300 rcx=0000000000000000
rdx=0000000000000002 rsi=ffffab0bf73be050 rdi=ffffab0bf73bea10
rip=fffff8011bc869f9 rsp=ffffbd0e01e3eb40 rbp=0000000000000080
r8=0000000000000000 r9=000000000000002f r10=fffff8011bd3a390
r11=ffffbd0e01e3eba0 r12=0000000000000487 r13=0000000000000000
r14=ffffab0bee291040 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!KeSetEvent+0x9:
fffff8011bc869f9 f6017f test byte ptr [rcx],7Fh ds:002b:0000000000000000=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: System

READ_ADDRESS: 0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p . %s .

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000000

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffffbd0e01e3eb40 fffff801232603c7 : fffff80123008830 ffffab0bf6df3300 0000000000000080 ffffab0bf73be050 : nt!KeSetEvent+0x9
ffffbd0e01e3ebd0 fffff80123008830 : ffffab0bf6df3300 0000000000000080 ffffab0bf73be050 0000000000000000 : DDHID1906+0x2603c7
ffffbd0e01e3ebd8 ffffab0bf6df3300 : 0000000000000080 ffffab0bf73be050 0000000000000000 0000000000000487 : DDHID1906+0x8830
ffffbd0e01e3ebe0 0000000000000080 : ffffab0bf73be050 0000000000000000 0000000000000487 ffffab0bf73be050 : 0xffffab0bf6df3300 ffffbd0e01e3ebe8 ffffab0bf73be050 : 0000000000000000 0000000000000487 ffffab0bf73be050 fffff8011bd55855 : 0x80 ffffbd0e01e3ebf0 0000000000000000 : 0000000000000487 ffffab0bf73be050 fffff8011bd55855 ffffab0bf6df3300 : 0xffffab0bf73be050

SYMBOL_NAME: DDHID1906+2603c7

MODULE_NAME: DDHID1906

IMAGE_NAME: DDHID1906.sys

STACK_COMMAND: .cxr 0xffffbd0e01e3e140 ; kb

BUCKET_ID_FUNC_OFFSET: 2603c7

FAILURE_BUCKET_ID: AV_DDHID1906!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {90a47292-f375-272c-7b70-72f8b94e14e5}

Followup: MachineOwner

Mouse movement and click

Hello, I'm trying to move the mouse and click in a program, but it doesn't work, can you help?

selling new bypass for mouse move you can use in any game

any one want to buy contact me here Madris#1575 the price is 150$
you can make your aimbot or trigger bot undetected
undetected mouse move working on this games :
valorant
fortnite
pubg steam
apex legends
warzone
creative destruction
cyber hunter

secure boot

i tried running it but it doesn't work if secure_boot is on.
can u run it with secure boot off? it gives me an error

help

I want my move commands instantly , not smoothly. how can i do it?

RDP

Does it work on the server to which it is connected via RDP?
I can't seem to get it to work on the server

ddhid1906 win10休眠唤醒后蓝屏--附dmp

MULTIPLE_IRP_COMPLETE_REQUESTS (44) -- 相同issues:#9

BUGCHECK_CODE: 44

BUGCHECK_P1: ffffc48509eb12a0

BUGCHECK_P2: 1232

BUGCHECK_P3: 0

BUGCHECK_P4: 0

IRP_ADDRESS: ffffc48509eb12a0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff107bf9e5798 fffff80611e3c33e : 0000000000000044 ffffc48509eb12a0 0000000000001232 0000000000000000 : nt!KeBugCheckEx
fffff107bf9e57a0 fffff80611c84de7 : 0000000000000000 ffffc48509eb1200 ffffc48509eb12a0 0000000000040246 : nt!IopfCompleteRequest+0x1b753e
fffff107bf9e5890 fffff8062b58ac5a : ffff775fe2bfd5d0 ffff86006f511180 0000000000000000 0000000080000000 : nt!IofCompleteRequest+0x17
fffff107bf9e58c0 ffff775fe2bfd5d0 : ffff86006f511180 0000000000000000 0000000080000000 ffffc48526e8e1a0 : DDHID1906+0x2aac5a
fffff107bf9e58c8 ffff86006f511180 : 0000000000000000 0000000080000000 ffffc48526e8e1a0 fffff80630af398a : 0xffff775fe2bfd5d0 fffff107bf9e58d0 0000000000000000 : 0000000080000000 ffffc48526e8e1a0 fffff80630af398a ffffc48531b81de0 : 0xffff86006f511180

SYMBOL_NAME: DDHID1906+2aac5a

MODULE_NAME: DDHID1906

IMAGE_NAME: DDHID1906.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2aac5a

FAILURE_BUCKET_ID: 0x44_DDHID1906!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

getting Error ID 7: timeout

Always thanks for your software.
I’ve been using DD for several months, and today I got this error message…

Is your server under problematic situation?

or do you have any solution on this case?

Please let me know..

please help me

how to use pyautomaker.dd ?
i'm a beginner. i already install pyautomaker like pip install PyAutoMaker
but my python hasn't pyautomaker.dd

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.