allogic / KDBG
The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line interface for the driver. It originated due to insufficient useability with CheatEngine's DBVM driver while debugging games running under certain AntiCheat software.
☆92Updated 2 years ago
Alternatives and similar repositories for KDBG:
Users that are interested in KDBG are comparing it to the libraries listed below
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆79Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 5 years ago
- ☆50Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆109Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆123Updated 2 years ago
- ☆78Updated 3 years ago
- Kernel Lazy Importer☆109Updated 10 months ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆107Updated 3 years ago
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆53Updated 2 years ago
- DWM Overlay without write .text☆65Updated 5 months ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆80Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- ☆163Updated 2 years ago
- InfinityHookProMax: Make InfinityHook great great again☆42Updated last year
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆109Updated 2 years ago
- Easy Anti PatchGuard☆217Updated 3 years ago
- x64 manual mapper using inline syscalls☆8Updated 3 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆150Updated 5 months ago
- ☆87Updated last year
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆73Updated last year
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆90Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆70Updated 2 years ago
- i stole this from some guys private repo on github☆55Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆82Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆46Updated 11 months ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆136Updated last year
- Detect removed thread from PspCidTable.☆68Updated 2 years ago
- Discarded Section Manual Map☆67Updated 4 years ago