cbwang505 / windbg-uefi
这篇文章的目的是介绍一款实验性项目基于COM命名管道或者Windows Hyper-V虚拟机Vmbus通道实现的运行在uefi上的windbg调试引擎开发心得
☆39Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for windbg-uefi
- ☆23Updated 8 months ago
- windows kernel pagehook☆38Updated 2 years ago
- https://www.huorong.cn/☆14Updated 7 months ago
- Based on minhook☆27Updated last year
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- Windows Research Kernel VS2022 Solution☆24Updated 2 months ago
- direct systemcalls with a modern c++20 interface.☆42Updated last year
- bootkit驱动映射,三环进程注入加载指定模块☆11Updated last month
- ntos shit☆21Updated 9 months ago
- A method to Disable DSE using .data ptr hooks☆26Updated 9 months ago
- ☆24Updated last year
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆33Updated 7 months ago
- Kernel Level NMI Callback Blocker☆32Updated 2 months ago
- ☆28Updated 10 months ago
- Static Library For Windows Drivers☆30Updated this week
- VT调试器插件搭配的CE☆15Updated 2 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆19Updated 2 years ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆66Updated 3 weeks ago
- Windows kernel drivers simple HTTP library for modern C++☆41Updated 6 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- 大部分常见windows内核文件合集 下方链接里有更多更全面的☆14Updated last year
- ☆29Updated last year
- 使用 Intel 虚拟化特性实现应用层HOOK☆28Updated last week
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- WinDbg-Samples ExdiGdbSrv fork 修复了一部分Vmware调试的问题☆24Updated last year
- VEH debug plugin☆13Updated 2 years ago
- ☆26Updated last year