ch3rn0byl / AngryWindowsLinks
Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.
☆160Updated 2 years ago
Alternatives and similar repositories for AngryWindows
Users that are interested in AngryWindows are comparing it to the libraries listed below
Sorting:
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆116Updated 2 years ago
- Modify your BSOD!☆39Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Doom running in the NT kernel☆174Updated 2 years ago
- Application that demonstrates how to manually cause bluescreen using undocumented Windows Native API☆39Updated 8 years ago
- The simple UEFI application to create a Windows Platform Binary Table (WPBT) from the UEFI shell.☆114Updated 3 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆174Updated last year
- Integration of Microsoft Warbird with the MSVC compiler☆105Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆248Updated 2 years ago
- Documentation of Microsoft's Warbird obfuscation☆52Updated 10 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆82Updated last year
- Exploit MsIo vulnerable driver☆108Updated 3 years ago
- ☆71Updated 2 years ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆167Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆294Updated 9 months ago
- Code that overwrites the Windows MBR with a custom bootloader!☆61Updated 3 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆142Updated 6 years ago
- Windows Kernel Programming Experiments☆80Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆241Updated 4 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆151Updated 2 years ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆82Updated last month
- Simple windows API logger☆108Updated 5 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆205Updated 4 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆154Updated 3 years ago
- Shell extension for opening executables in IDA☆189Updated 2 years ago
- Reimplementation of Microsoft's Warbird obuscator☆132Updated last year
- Abusing exceptions for code execution.☆111Updated 2 years ago