The industry standard for persistence cleanup and hardware identifier rollback.
Engineered for testing environments requiring absolute sterility.
Deep Registry Scan
Heuristic analysis of registry hives to identify and nullify persistent tracking keys left by anti-cheat kernels.
Hardware Masquerade
Temporary serialization of GPU, Disk, and SMBIOS identifiers to simulate a fresh hardware environment.
Headless Operation
Fully controllable via command line arguments for integration into automated testing scripts.
Documentation
Comprehensive guide for the Sylic Command Line Interface (v1.2.0).
Introduction
Sylic is a proprietary system maintenance tool designed to restore digital privacy and system neutrality. It is widely used by security researchers, QA testers, and hardware enthusiasts to reset the "digital fingerprint" of a Windows machine without requiring a full operating system reinstallation.
Unlike standard cleaners (e.g., CCleaner), Sylic operates at the Kernel Level (Ring 0). By leveraging a vulnerable driver exploitation technique (BYOVD), Sylic can intercept and modify hardware queries sent by third-party applications (such as anti-cheat engines or tracking telemetry) before they reach the actual hardware.
Installation & Prerequisites
Sylic is a portable CLI application. No installation wizard is required, ensuring a minimal filesystem footprint.
System Requirements
Windows 10 (Build 2004+) or Windows 11
Visual C++ Redistributable 2019+
Secure Boot: DISABLED (Required for driver mapping)
TPM: Recommended Disabled for deep spoofing
First Run Initialization
./sylic-cli.exe --init [INFO] Extracting Kernel Driver resource... OK [INFO] Mapping driver to 0xFFFFAC01... OK [SUCCESS] Engine initialized. Type --help for commands.
Registry Audit
The audit module uses a heuristic engine to scan for "hidden" registry keys often used by commercial software to track users across reinstallations. This is a read-only operation unless the --clean flag is passed.
sylic scan --depth=deep
HWID Spoofing
This module handles the randomization of hardware serials. By default, changes are volatile (they reset after a physical reboot) to prevent permanent hardware warranty voiding.
Advanced Warning
Improper use of the --persist flag can corrupt your Windows License activation or break specific OEM software. Ensure you have a Restore Point.
Command Reference
Flag
Parameters
Description
--target
disk, gpu, ram, smbios, all
Defines which hardware component to target.
--mode
static, dynamic
'Static' uses a consistent seed. 'Dynamic' randomizes every run.
--set
"string"
Manually sets a specific serial number (e.g. for restoring).
--persist
N/A
Writes changes to registry/firmware (Permanent).
Examples
// 1. Standard temporary spoof for all componentssylic hwid --target=all--mode=dynamic// 2. Target only GPU UUID with a specific stringsylic hwid --target=gpu--set="NVIDIA-CUSTOM-992"
Configuration
For automated environments (e.g., CI/CD pipelines or farm management), Sylic supports a `config.json` file in the root directory.
Sylic automatically creates a standard Windows Restore Point named Sylic_PreOp_[Timestamp] before executing any write operations.
How to Recover
If your system fails to boot or experiences instability:
Force restart your PC 3 times to trigger the Windows Recovery Environment.
Navigate to Troubleshoot > Advanced Options > System Restore.
Select the latest snapshot created by Sylic.
Legal Disclaimer
Educational Use Only
Sylic is provided "as is" without warranty of any kind. The developers are not responsible for any damage caused to hardware, software, or loss of data. Use of this tool to bypass terms of service of third-party applications may result in account termination.