0xyg3n / UAC_Exploit
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
☆252Updated 4 years ago
Alternatives and similar repositories for UAC_Exploit:
Users that are interested in UAC_Exploit are comparing it to the libraries listed below
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆197Updated 3 months ago
- Tool to create hidden registry keys.☆476Updated 5 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆553Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆274Updated 3 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆469Updated 3 years ago
- C# tool for UAC bypasses☆418Updated 3 years ago
- Evading Anti-Virus with Unusual Technique☆212Updated last year
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆598Updated 2 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆748Updated 3 years ago
- ☆144Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆453Updated 3 years ago
- Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components☆261Updated 3 years ago
- The program is designed to obfuscate the shellcode.☆198Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆315Updated last year
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- Inject .NET assemblies into an existing process☆487Updated 3 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆213Updated 3 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- Executable that mutates its own code☆372Updated 2 months ago
- OffensivePH - use old Process Hacker driver to bypass several user-mode access controls☆329Updated 3 years ago
- C# Based Universal API Unhooker☆393Updated 2 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆340Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆428Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆643Updated 11 months ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆388Updated 4 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆264Updated 5 years ago
- Just another Windows Process Injection☆390Updated 4 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆212Updated 3 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆638Updated 5 years ago
- Phantom DLL hollowing PoC☆355Updated 2 years ago