Skip to content

Latest commit

 

History

History
211 lines (148 loc) · 13.7 KB

README.md

File metadata and controls

211 lines (148 loc) · 13.7 KB

What this

Caution

A place for me to log my thoughts an explore the universe of tweaks, skizo shit and all. This isn't your end-all be-all for tweaks, or maybe it'll end up that way, who knows.

Some changes outlined below WILL negatively impact security an you WILL lose out on a lot of functionality if not careful. If I ever get around to actually listing out all the stuff I do.

That being said, continue on your never ending journey of maxing performance. I'll be soft on your heels king

Its not a crack house, its a crack home fellow tweaker 💒

Tip

Don't go an just start copy-pasting into your fuckin powershell either dickhead. I'm fine with reinstalling my OS for the 50th time from scratch, are you? It's been a long journey, you'd think I'd learn to stop stripping my OS down so far that its unrestorable after the 49th time I break it. The things an autist will do in the name of performance

I digress. The reason I've even started this project is because I finally pushed my luck too far an managed to wipe both my drives, killing one of them, long time coming to be fair. This means all my tools/scripts/guides I had went up in flames, getting me to stop being lazy an compile everything into something digestable for not only myself, but for you tweakers too.

83a3adfc2f034f2195cf5ea0d8979f007935d87db3168d01c7eb6ca22faef67c_1-1558174810


Software

Drivers, Tools, Programs

Drivers

$\color{orange}\textsf{{Links possibly out of date, check}}$

Driver Link Version Date
Nvidia GPU Driver Download v576.12 1/30/2025
Realtek Ethernet Driver Download v1125.021 12/24/2024
XL2546K Driver Download v001 1/3/2022
Samsung G7 Driver Download v1.0

Firmware (Only if needed)

Samsung G7 Firmware File - > Download - v1012.0
Nvidia GPU Firmware Update Software - > Download - v1.2 - 11/18/2022

Tools

(Tools may not link to most up to date stuff, check)
All folders have a # Use/Install Explanation, read them for help

ProcessExplorer - > Download - 5/28/2024
NVCleanstall - > Download - v1.80.0 - 1/25/2025
NvidiaProfileInspector - > Download - v2.4.0.8 - 1/26/2025

Optional

DiscordFixer - > Download - 1/22/2024
NoSteamWebHelper - > Download - v5.0.1 - 12/1/2024
Custom Resolution Utility - > Download - v1.5.2 - 7/5/2024
Scaled Resolution Editor - > Download - v1.0 - 1/15/2024
SwitchPowerScheme - > Download - v1.3 - 6/11/2021

Programs

(Programs may not link to most up to date stuff, check)

7zip - > Download
Battle.net - > Download
BlackDesert - > Download
Deluge - > Download
Discord - > Download
Firefox - > Download
Notepad++ - > Download
Powershell 7 - > Download
System Informer - > Download
Steam - > Download
Thunderstore Mod Manager - > Download
Vencord - > Download
Wootility - > Download

Research

Important

These are tested on MY system, a specific configuration of hardware/software. What I did may not produce the results you may get. I cannot gureentee anything other then the stuff I test on my own system, these are just my findings.

Bcdedit Options

Warning

Messing with your bcdedit options can make it so a majority of anti-cheats won't work, causing games to be unplayable, heres my safe tested list

  • Anti-Cheats tested on > Battle-Eye, nProtect, Easy-Anti-Cheat, XignCode

-- Safe for Anti-Cheats --

BCDEDIT KEY VALUE
bcdedit /set debug No
bcdedit /set disabledynamictick Yes
bcdedit /set disableelamdrivers Yes
bcdedit /set extendedinput Yes
bcdedit /set forcefipscrypto No
bcdedit /set highestmode Yes
bcdedit /set nointegritychecks Yes
bcdedit /set nolowmem Yes
bcdedit /set noumex Yes
bcdedit /set novga Yes
bcdedit /set bootdebug No
bcdedit /set bootlog No
bcdedit /set ems No
bcdedit /set event No
bcdedit /set forcelegacyplatform No
bcdedit /set halbreakpoint No
bcdedit /set hypervisordebug No
bcdedit /set isolatedcontext No
bcdedit /set recoveryenabled No
bcdedit /set usefirmwarepcisettings No
bcdedit /set uselegacyapicmode No
bcdedit /set usephysicaldestination No
bcdedit /set useplatformclock No
bcdedit /set vga No
bcdedit /set vm No
bcdedit /set configaccesspolicy Default
bcdedit /set msi Default
bcdedit /set x2apicpolicy Enable
bcdedit /set linearaddress57 optout
bcdedit /set bootux Disabled
bcdedit /set tpmbootentropy ForceDisable
bcdedit /set nx AlwaysOff/optout
bcdedit /set bootmenupolicy Legacy
bcdedit /set firstmegabytepolicy UseAll
bcdedit /set allowedinmemorysettings 0x0
bcdedit /set avoidlowmemory 0x8000000
bcdedit /set increaseuserva 268435328

-- Not Safe for Anti-Cheats --

bcdedit /set testsigning Yes
bcdedit /set hypervisorlaunchtype Off
bcdedit /set vsmlaunchtype No
bcdedit /set pae ForceDisable
bcdedit /set loadoptions DISABLE-LSA-ISO,DISABLE-VBS

-- Works with Anti-Cheat. Unsure on Results (Performance), Testing --

bcdedit /set tscsyncpolicy Enhanced
bcdedit /set tscsyncpolicy Legacy
bcdedit /set useplatformtick Yes

-- Need to Test Still --

bcdedit /set bootems No
bcdedit /set integrityservices disable

Process Mitigations

Note

A second round of testing~ now on $\color{orange}\textsf{{Windows 11 IoT Enterprise LTSC (24H2)}}$, was on $\color{orange}\textsf{{Windows 11 Pro (23H2)}}$, same results. Thought maybe it was since I tweak the shit out of my os, I had broken something an the mitigation settings weren't being set correctly. Turns out, two fresh OS installs an two 6 hour sessions tediously restarting my pc and games over an over have left me to my final conclusion~ I can't blindly trust even what I think are pretty well known + used tweaks. I have skimmed over a lot of 'tweaking' guides an files, it seems like the general conclusion without question is that having the setting MitigationOptions & MitigationAuditOptions set to $\color{blue}\textsf{{222222222222222222222222222222222222222222222222}}$ will mask all mitigations, turning them off. Saw some dickhead with a weird set of values an was like 👺 what he know that I don't? Now, I also been assimilated into said dickhead with the weird values.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\kernel]

MitigationAuditOptions
MitigationOptions 

Using the mask $\color{blue}\textsf{{222222222222222222222222222222222222222222222222}}$ for MitigationOptions might not actually disable them, using (powershell) Get-ProcessMitigation -Name discord.exe -RunningProcess returned that both CFG and ASLR high/bottom was enabled, with process explorer also confirming this. Instead I took a look at what mask is set when using Set-ProcessMitigation -System -Disable <big block of values from microsoft website> an it returned $\color{blue}\textsf{{222222222222222220020000002000200000002000000000}}$. After a restart, running the Get-ProcessMitigation command for discord now shows that ASLR and CFG is disabled, with process explorer also confirming. This isn't limited to just discord, I checked steam an a couple games with the same results

Another discovery is that if I used -Force On at the end of Set-ProcessMitigation -System -Disable <values> it instead set the mask as $\color{blue}\textsf{{666666666666666660060000006000600000006000000000}}$, which overrides mitigations completely at a system level but made some apps loop opening an closing child processes causing high cpu usage (discord, steam) The reason I can find for this is because apps override some mitigations for its children, for example a value of 2 signals that it should be disabled, but itll allow it if necessary. A value of 6 completely disallows this, causing those child processes to break. Use the -Force On to set the override value when doing Get-ProcessMitigation -System

You can disable mitigations with either of the options below, they do literally the same thing.

Disabling Mitigations w/ Powershell (Run as Admin)

Set-ProcessMitigation -System -Disable DEP, EmulateAtlThunks, SEHOP, ForceRelocateImages, RequireInfo, BottomUp, HighEntropy, StrictHandle, DisableWin32kSystemCalls, AuditSystemCall, DisableExtensionPoints, BlockDynamicCode, AllowThreadsToOptOut, AuditDynamicCode, CFG, SuppressExports, StrictCFG, MicrosoftSignedOnly, AllowStoreSignedBinaries, AuditMicrosoftSigned, AuditStoreSigned, EnforceModuleDependencySigning, DisableNonSystemFonts, AuditFont, BlockRemoteImageLoads, BlockLowLabelImageLoads, PreferSystem32, AuditRemoteImageLoads, AuditLowLabelImageLoads, AuditPreferSystem32, EnableExportAddressFilter, AuditEnableExportAddressFilter, EnableExportAddressFilterPlus, AuditEnableExportAddressFilterPlus, EnableImportAddressFilter, AuditEnableImportAddressFilter, EnableRopStackPivot, AuditEnableRopStackPivot, EnableRopCallerCheck, AuditEnableRopCallerCheck, EnableRopSimExec, AuditEnableRopSimExec, SEHOP, AuditSEHOP, SEHOPTelemetry, TerminateOnError, DisallowChildProcessCreation, AuditChildProcess, UserShadowStack, AuditUserShadowStack, DisableFsctlSystemCalls

Disabling Mitigations w/ CMD

:: Disabling mitigations with correct mask
REG ADD "HKLM\System\CurrentControlSet\Control\Session Manager\kernel" /v "MitigationAuditOptions" /t REG_BINARY /d "200000202020222200000000000000200000000000000000" /f >NUL 2>&1
REG ADD "HKLM\System\CurrentControlSet\Control\Session Manager\kernel" /v "MitigationOptions" /t REG_BINARY /d "222222222222222220020000002000200000002000000000" /f >NUL 2>&1

Just dropping these here for now

Note

Highlights information that users should take into account, even when skimming.

Tip

Optional information to help a user be more successful.

Important

Crucial information necessary for users to succeed.

Warning

Critical content demanding immediate user attention due to potential risks.

Caution

Negative potential consequences of an action.