NSG650 / BugCheckHackLinks
Modify your BSOD!
☆38Updated 3 years ago
Alternatives and similar repositories for BugCheckHack
Users that are interested in BugCheckHack are comparing it to the libraries listed below
Sorting:
- Doom running in the NT kernel☆178Updated 2 years ago
- Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.☆166Updated 3 years ago
- Bad apple in the BSOD [yet again]☆13Updated 3 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆29Updated 4 months ago
- Application that demonstrates how to manually cause bluescreen using undocumented Windows Native API☆39Updated 9 years ago
- Documentation of Microsoft's Warbird obfuscation☆53Updated last year
- Example of using Windows Platform Binary Table (WPBT)☆26Updated 2 years ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆29Updated last year
- C++ Program used to dump Themida and VMProtect.☆31Updated last year
- A CS Source Engine² for Creating Cheat/Trainers, Debug Valve Code, Exploring hidden game engine features, Exploit Develop, Assembly Analy…☆19Updated 3 years ago
- exploder☆13Updated last year
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Hardware ID☆54Updated 3 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- Prevent Windows from BSODing!☆124Updated 3 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆125Updated 3 years ago
- 64 bit monolithic nt-style kernel☆97Updated 4 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- Bypass valorant page guard external☆23Updated 4 years ago
- Control Flow Linearization☆25Updated 6 months ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆51Updated 3 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆78Updated 3 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆57Updated 3 years ago
- Load vulnerable drivers using iqvw64e.sys hijack☆30Updated last year
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆43Updated 4 years ago
- The program is intended for a dynamic unpacking of binders, crypters, packers and protectors☆10Updated 5 years ago
- 🤡 single header wrapper around Windows WMI for C++☆14Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32Updated 3 years ago