0x9ef / golang-uacbypasserLinks
Windows UAC bypass techniques implemented and written in Go
☆213Updated 3 years ago
Alternatives and similar repositories for golang-uacbypasser
Users that are interested in golang-uacbypasser are comparing it to the libraries listed below
Sorting:
- Really stupid re-implementation of invoke-wmiexec☆216Updated 2 years ago
- Another Go Shellcode Loader using Windows APIs☆140Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆340Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆187Updated 3 years ago
- Process Injection Techniques with Golang☆79Updated 5 years ago
- Steal privileged token to obtain SYSTEM shell☆250Updated 5 years ago
- Go library for credentials recovery☆220Updated 2 years ago
- Windows Defender ShellCode Execution Bypass☆130Updated 5 years ago
- Golang evasion tool, execute-assembly .Net file☆97Updated 3 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆68Updated 6 years ago
- Reflective DLL loading of your favorite Golang program☆169Updated 5 years ago
- ☆158Updated 3 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆164Updated 5 years ago
- a patched sshd for red team activities☆82Updated 3 years ago
- Another shellcode runner 🦀 🐚☆149Updated 3 years ago
- Use to build an anonymous SMB file server.☆231Updated 3 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- Windows NTLM Authentication Backdoor☆240Updated 6 months ago
- 破解CS4.0☆162Updated 5 years ago
- LOLBINs that inject a DLL into a given process ID.☆138Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆113Updated 4 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆246Updated 4 years ago
- Reflectively load PE☆103Updated 4 years ago
- A backdoor module for Apache2☆198Updated 5 years ago
- Allow a Go process to dynamically load .NET assemblies☆149Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆180Updated 3 years ago
- Programmatically create an administrative user under Windows☆182Updated 8 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆489Updated 4 years ago
- Beacon Object File (BOF) Creation Helper☆229Updated 3 years ago