ch3rn0byl / AngryWindowsLinks
Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.
☆166Updated 3 years ago
Alternatives and similar repositories for AngryWindows
Users that are interested in AngryWindows are comparing it to the libraries listed below
Sorting:
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆122Updated 3 years ago
- Doom running in the NT kernel☆178Updated 2 years ago
- Modify your BSOD!☆38Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆256Updated 3 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆113Updated 2 years ago
- Application that demonstrates how to manually cause bluescreen using undocumented Windows Native API☆39Updated 9 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆190Updated last year
- Reimplementation of Microsoft's Warbird obuscator☆151Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆306Updated last year
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆206Updated 4 years ago
- Documentation of Microsoft's Warbird obfuscation☆52Updated last year
- Exploit MsIo vulnerable driver☆114Updated 4 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago
- ☆72Updated 2 years ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆128Updated 2 months ago
- DSE bypass using a leaked cert and adjusting the current clock.☆151Updated 3 weeks ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Updated 4 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆146Updated 6 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 3 years ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆120Updated 4 years ago
- Example of using Windows Platform Binary Table (WPBT)☆26Updated 2 years ago
- Windows Kernel Programming Experiments☆82Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- The best theme for x64dbg!☆89Updated 3 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆159Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆155Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆207Updated 4 years ago