Need help with Kernel-Anit-Anit-Debug-Plugins?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

229 Stars 96 Forks MIT License 29 Commits 0 Opened issues


Kernel Anit Anit Debug Plugins 内核反反调试插件

Services available


Need anything else?

Contributors list

# 124,533
28 commits


内核反反调试插件 Kernel Anit-Anit-Debug Plugins


English(Translation from

When debugging begins, a kernel object called “debug object” will be created


通过重写 By rewrite

NtDebugActiveProcess DbgkpQueueMessage KiDispatchException DebugActiveProcess DbgUixxx

等函数绕过调试对象(Process->DebugObject)以及其他关键位置实现反反调试效果 such functions to bypass debugging object (Process->DebugObject)and other key locations to achiece anti-anti-debugging effects


Currently implemented

  • 内核绕过DebugPort
  • Kernel bypss DebugPort

  • 应用层绕过DbgUiDebugObjectHandle (NtCurrentTeb()->DbgSsReserved[1])

  • R3 bypass DbgUiDebugObjectHandle (NtCurrentTeb()->DbgSsReserved[1])

  • 应用层绕过PEB->BeingDebugged

  • R3 bypass PEB->BeingDebugged

  • 支持创建进程和附加进程

  • Support creation process and attacth process

  • 支持配合ScyllaHide插件同时使用

  • Support simultaneous use with ScyllaHide plugin

  • 支持x64dbg

  • Support x64dbg

  • 绕过VMP SE等反调试加壳

  • Bypass VMP SE and other anti-debug packers

  • 支持wow64

  • Support wow64

  • ....

  • 部分函数还没弄......
  • 不支持32位系统

  • Does not support 32-bit systems

  • 未知

  • Unknow


Future support (in order of priority)

- (已完成 有些是内核工程太大 不如在应用层做处理 内核做的话得不偿失)绕过大部分al-khaser应用层反调试手段

(Completed, some of the kernel projects are too big, it is better to do processing at the application layer, if the kernel does it, the gain is not worth the loss) bypass most al-khaser Application layer anti-debugging methods

  • 支持虚拟机双机调试 重写内核调试函数 绕过内核反调试检测
  • Support virtual machine dual-machine debugging, rewrite kernel debugging function, bypass kernel anti-debugging detection

  • 虚拟机双机调试支持VirtualKD -Virtual machine dual-machine debugging support VirtualKD

  • 支持Win10

  • Support Win10

  • 绕过部分游戏反调试保护(HS BE TP ...)

  • Bypass some game anti-debugging protection(HS BE TP ...)


从左到右依次为 From left to right

  • 未启用内核模式 虚拟机正常运行al-khaser
  • Kernel mode is not enabled The virtual machine is running al-khaser

  • AADebugTest启动al-khaser

  • AADebugTest start al-khaser

  • x64dbg无插件模式下启动al-khaser

  • Start al-khaser in x64dbg plug-in mode



从左到右依次为 From left to right - 虚拟机正常运行al-khaser - The virtual machine is running al-khaser normally

  • x64dbg AADebug插件+ScyllaHide插件 启动al-khaser
  • x64dbg AADebug plug-in + ScyllaHide plug-in Start al-khaser


Reference 启用内核STL Enable kernel STL (private project) 参考了不少该项目代码 部分代码被我放在了该项目中 不过那部分代码已经从公开库中删除

I put part of the code in the project, but that part of the code has been deleted from the public library


为了避免一些不必要的麻烦 删除了内核钩子库部分代码 剩余部分已经补全

The anti-anti-debugging plug-in is special. In order to avoid some unnecessary troubles, some codes have been deleted (only less than 1% have been deleted


Release passwd

123 1234 123456 123456789 (我忘记具体是哪个了...)


注:仅供windows内核技术交流 邀请制或审核制入群 申请加群后 我会添加好友 麻烦各位通过好友请求并耐心等待审核

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.