ch3rn0byl / AngryWindows
Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.
☆157Updated 2 years ago
Alternatives and similar repositories for AngryWindows
Users that are interested in AngryWindows are comparing it to the libraries listed below
Sorting:
- Modify your BSOD!☆39Updated 2 years ago
- Doom running in the NT kernel☆170Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 4 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆111Updated 2 years ago
- Application that demonstrates how to manually cause bluescreen using undocumented Windows Native API☆39Updated 8 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆169Updated 9 months ago
- 64 bit monolithic nt-style kernel☆98Updated 4 years ago
- Prevent Windows from BSODing!☆111Updated 3 years ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆162Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆245Updated 2 years ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆109Updated 3 years ago
- ☆138Updated last year
- Documentation of Microsoft's Warbird obfuscation☆50Updated 8 months ago
- Exploit MsIo vulnerable driver☆100Updated 3 years ago
- Crashes ida on static analyses.☆106Updated 2 weeks ago
- DSE bypass using a leaked cert and adjusting the current clock.☆150Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆63Updated 8 months ago
- Example of using Windows Platform Binary Table (WPBT)☆20Updated last year
- ☆71Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆237Updated 3 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆202Updated 3 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆179Updated last year
- The best theme for x64dbg!☆83Updated 2 years ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆110Updated last year
- Scan for potentially vulnerable drivers☆87Updated 3 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆76Updated last year
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆44Updated 2 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆137Updated 5 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆78Updated last year
- alternative smm driver for ryzen motherboards☆147Updated 7 months ago