The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line interface for the driver. It originated due to insufficient useability with CheatEngine's DBVM driver while debugging games running under certain AntiCheat software.
☆99Sep 12, 2022Updated 3 years ago
Alternatives and similar repositories for KDBG
Users that are interested in KDBG are comparing it to the libraries listed below
Sorting:
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- ☆99Oct 6, 2017Updated 8 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- Intel learning hypervisor and some extend function☆23Aug 23, 2025Updated 6 months ago
- ☆39Oct 29, 2020Updated 5 years ago
- undetected eac mapper☆171May 3, 2022Updated 3 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆284Jan 27, 2025Updated last year
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- neat way to detect memory read using nt layer function.☆14Aug 4, 2023Updated 2 years ago
- Win7内核私有符号结构转储☆70Sep 3, 2021Updated 4 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆97May 25, 2021Updated 4 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- 不 使用3环挂钩进行DWM桌面绘制☆82Dec 9, 2021Updated 4 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆98Mar 30, 2023Updated 2 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- ☆69Aug 31, 2021Updated 4 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- VT Hook☆51Jul 2, 2024Updated last year
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆480Aug 31, 2021Updated 4 years ago
- DBKKernel used by Cheat Engine. Specially revised for VS2017 win10.☆34Jan 8, 2018Updated 8 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Aug 28, 2022Updated 3 years ago
- [POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)☆17Mar 30, 2020Updated 5 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆55Jul 24, 2021Updated 4 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆385Jan 29, 2022Updated 4 years ago