ch3rn0byl / AngryWindowsLinks
Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.
☆161Updated 2 years ago
Alternatives and similar repositories for AngryWindows
Users that are interested in AngryWindows are comparing it to the libraries listed below
Sorting:
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆118Updated 2 years ago
- Modify your BSOD!☆39Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Doom running in the NT kernel☆175Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆297Updated 9 months ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆116Updated 3 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆177Updated last year
- Documentation of Microsoft's Warbird obfuscation☆52Updated 11 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆252Updated 2 years ago
- ☆71Updated 2 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆109Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆86Updated last year
- Reimplementation of Microsoft's Warbird obuscator☆135Updated last year
- Application that demonstrates how to manually cause bluescreen using undocumented Windows Native API☆39Updated 8 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆150Updated 2 years ago
- Windows Kernel Programming Experiments☆80Updated 2 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆156Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆30Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Updated 4 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- Exploit MsIo vulnerable driver☆110Updated 3 years ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆80Updated 4 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆182Updated 3 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆206Updated 4 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆142Updated 6 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆28Updated 3 years ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆153Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago