Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.
☆170Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for AngryWindows
Users that are interested in AngryWindows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Apr 7, 2015Updated 10 years ago
- A UEFI extraction tool☆25Nov 3, 2024Updated last year
- 64 bit monolithic nt-style kernel☆99Apr 14, 2021Updated 4 years ago
- Modify your BSOD!☆39May 24, 2022Updated 3 years ago
- ☆25May 21, 2021Updated 4 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- A kernel level driver for Windows built to configure the Blue Screen Of Death☆21Jul 30, 2021Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆271Aug 31, 2022Updated 3 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆488May 18, 2021Updated 4 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- A basic PE bootloader☆15Oct 21, 2023Updated 2 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆58Sep 12, 2019Updated 6 years ago
- ☆44Jul 11, 2023Updated 2 years ago
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆13Mar 4, 2026Updated 2 weeks ago
- Example for PagedOut!☆26Oct 22, 2019Updated 6 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆663Jan 28, 2025Updated last year
- Virtualization detection through speculative execution PoCs and papers☆69May 22, 2018Updated 7 years ago
- Analyzing the driver and internal module of EasyAntiCheat.☆40May 1, 2023Updated 2 years ago
- ☆16May 15, 2021Updated 4 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆58Oct 14, 2022Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆321Oct 13, 2024Updated last year
- Small handy tool for crafting shellcodes by hand.☆18Apr 20, 2022Updated 3 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 8 months ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Doom running in the NT kernel☆177May 27, 2023Updated 2 years ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆14Mar 26, 2024Updated last year
- ☆13Sep 25, 2023Updated 2 years ago
- Experiment building lifting-bits dependencies with pure CMake. Migrated to:☆22Oct 8, 2024Updated last year
- ☆59Jun 8, 2022Updated 3 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆12Jan 27, 2024Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Yet another windows internals repo☆220Aug 29, 2021Updated 4 years ago
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago