ch3rn0byl / AngryWindows
Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.
☆155Updated 2 years ago
Alternatives and similar repositories for AngryWindows:
Users that are interested in AngryWindows are comparing it to the libraries listed below
- Modify your BSOD!☆38Updated 2 years ago
- Doom running in the NT kernel☆168Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- Application that demonstrates how to manually cause bluescreen using undocumented Windows Native API☆40Updated 8 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆108Updated 2 years ago
- Documentation of Microsoft's Warbird obfuscation☆48Updated 6 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆97Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆59Updated 11 months ago
- 64 bit monolithic nt-style kernel☆97Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆274Updated 5 months ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆41Updated 2 years ago
- Makes IDA (most versions) to crash upon opening it.☆82Updated 6 months ago
- DSE bypass using a leaked cert and adjusting the current clock.☆147Updated 2 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆165Updated 8 months ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆157Updated 3 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆178Updated last year
- Windows 10 (32-bit) temporary watermark remover.☆53Updated 2 years ago
- Exploit MsIo vulnerable driver☆94Updated 3 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆232Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 4 years ago
- The Windows Research Kernel (WRK)☆192Updated 8 years ago
- ☆70Updated 2 years ago
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆232Updated this week
- The best theme for x64dbg!☆82Updated 2 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆66Updated last year
- alternative smm driver for ryzen motherboards☆118Updated 5 months ago
- Comparing, discussing, and bypassing various techniques for suspending and freezing processes on Windows.☆118Updated 3 years ago
- Crashes ida on static analyses.☆102Updated 6 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆77Updated 7 months ago