allogic / KDBGLinks
The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line interface for the driver. It originated due to insufficient useability with CheatEngine's DBVM driver while debugging games running under certain AntiCheat software.
☆95Updated 2 years ago
Alternatives and similar repositories for KDBG
Users that are interested in KDBG are comparing it to the libraries listed below
Sorting:
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 6 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- ☆99Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆124Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆114Updated 3 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆75Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆92Updated 2 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆85Updated 4 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆93Updated 4 years ago
- ☆70Updated 3 years ago
- ☆81Updated 3 years ago
- Top level overlay drawing for game cheating using dwm.exe☆45Updated 3 years ago
- ☆50Updated last year
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- noob hooking dwm for overlay☆80Updated 4 years ago
- Easy Anti PatchGuard☆222Updated 4 years ago
- ☆53Updated 2 years ago
- Memory integrity check with CRC32 instruction, section-based☆44Updated last month
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆173Updated 3 years ago
- Detect removed thread from PspCidTable.☆72Updated 3 years ago
- ☆42Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆103Updated 2 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆51Updated last year
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆78Updated last year
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆113Updated 4 years ago
- Example driver on how to use SKLib☆53Updated 7 months ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆72Updated 2 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago