gmh5225 / kli-exView external linksLinks
Expanding Kernel Lazy Importer
☆32Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for kli-ex
Users that are interested in kli-ex are comparing it to the libraries listed below
Sorting:
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆50Mar 22, 2023Updated 2 years ago
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆13Aug 22, 2022Updated 3 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆117May 29, 2025Updated 8 months ago
- Kernel Lazy Importer☆130Apr 13, 2024Updated last year
- ☆144Dec 10, 2022Updated 3 years ago
- Utility functions for building Windows kernel drivers in Rust☆21Nov 16, 2021Updated 4 years ago
- VEH debug plugin☆13Apr 28, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆234Apr 2, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Kernel Level NMI Callback Blocker☆160Sep 27, 2025Updated 4 months ago
- A minimalistic way to spoof return addresses without using exceptions☆17Jul 26, 2022Updated 3 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- POC kernel driver with hidden system thread☆13May 14, 2024Updated last year
- ☆17Dec 18, 2020Updated 5 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- ☆59Mar 14, 2023Updated 2 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- base for testing☆186Sep 28, 2024Updated last year
- D3D11 Renderer☆17May 12, 2024Updated last year
- ☆159May 21, 2024Updated last year
- ☆73Aug 31, 2022Updated 3 years ago
- ☆23Oct 18, 2021Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- ☆49Feb 21, 2022Updated 3 years ago
- ☆39Mar 23, 2023Updated 2 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆58Dec 20, 2023Updated 2 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- ☆16Mar 13, 2023Updated 2 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- ☆223Mar 11, 2023Updated 2 years ago
- nmi stackwalking + module verification☆157Dec 28, 2023Updated 2 years ago
- a minimalistic windows hypervisor for amd processors☆138Jun 30, 2022Updated 3 years ago