v1.2.0-BETA :: PRODUCTION READY

System Clarity
Reimagined.

The industry standard for persistence cleanup and hardware identifier rollback. Engineered for testing environments requiring absolute sterility.

Deep Registry Scan

Heuristic analysis of registry hives to identify and nullify persistent tracking keys left by anti-cheat kernels.

Hardware Masquerade

Temporary serialization of GPU, Disk, and SMBIOS identifiers to simulate a fresh hardware environment.

Headless Operation

Fully controllable via command line arguments for integration into automated testing scripts.

Documentation

Comprehensive guide for the Sylic Command Line Interface (v1.2.0).

Introduction

Sylic is a proprietary system maintenance tool designed to restore digital privacy and system neutrality. It is widely used by security researchers, QA testers, and hardware enthusiasts to reset the "digital fingerprint" of a Windows machine without requiring a full operating system reinstallation.

Unlike standard cleaners (e.g., CCleaner), Sylic operates at the Kernel Level (Ring 0). By leveraging a vulnerable driver exploitation technique (BYOVD), Sylic can intercept and modify hardware queries sent by third-party applications (such as anti-cheat engines or tracking telemetry) before they reach the actual hardware.

Installation & Prerequisites

Sylic is a portable CLI application. No installation wizard is required, ensuring a minimal filesystem footprint.

System Requirements

  • Windows 10 (Build 2004+) or Windows 11
  • Visual C++ Redistributable 2019+
  • Secure Boot: DISABLED (Required for driver mapping)
  • TPM: Recommended Disabled for deep spoofing

First Run Initialization

./sylic-cli.exe --init
[INFO] Extracting Kernel Driver resource... OK
[INFO] Mapping driver to 0xFFFFAC01... OK
[SUCCESS] Engine initialized. Type --help for commands.

Registry Audit

The audit module uses a heuristic engine to scan for "hidden" registry keys often used by commercial software to track users across reinstallations. This is a read-only operation unless the --clean flag is passed.

sylic scan --depth=deep

HWID Spoofing

This module handles the randomization of hardware serials. By default, changes are volatile (they reset after a physical reboot) to prevent permanent hardware warranty voiding.

Advanced Warning Improper use of the --persist flag can corrupt your Windows License activation or break specific OEM software. Ensure you have a Restore Point.

Command Reference

Flag Parameters Description
--target disk, gpu, ram, smbios, all Defines which hardware component to target.
--mode static, dynamic 'Static' uses a consistent seed. 'Dynamic' randomizes every run.
--set "string" Manually sets a specific serial number (e.g. for restoring).
--persist N/A Writes changes to registry/firmware (Permanent).

Examples

// 1. Standard temporary spoof for all components sylic hwid --target=all --mode=dynamic // 2. Target only GPU UUID with a specific string sylic hwid --target=gpu --set="NVIDIA-CUSTOM-992"

Configuration

For automated environments (e.g., CI/CD pipelines or farm management), Sylic supports a `config.json` file in the root directory.

{
  "auto_init": true,
  "log_level": "verbose",
  "spoofing_profile": {
    "disk_serials": "random",
    "gpu_uuid": "preserve",
    "smbios": {
       "manufacturer": "ASUS",
       "product_name": "System Product Name"
    }
  },
  "protection": {
    "exclude_paths": [
      "C:\\Windows\\System32",
      "D:\\MyBackups"
    ]
  }
}

Safety & Recovery

Sylic automatically creates a standard Windows Restore Point named Sylic_PreOp_[Timestamp] before executing any write operations.

How to Recover

If your system fails to boot or experiences instability:

  1. Force restart your PC 3 times to trigger the Windows Recovery Environment.
  2. Navigate to Troubleshoot > Advanced Options > System Restore.
  3. Select the latest snapshot created by Sylic.

Legal Disclaimer

Educational Use Only Sylic is provided "as is" without warranty of any kind. The developers are not responsible for any damage caused to hardware, software, or loss of data. Use of this tool to bypass terms of service of third-party applications may result in account termination.