ADPunisher / Find-UACAutoElevateView external linksLinks
☆31Aug 13, 2025Updated 6 months ago
Alternatives and similar repositories for Find-UACAutoElevate
Users that are interested in Find-UACAutoElevate are comparing it to the libraries listed below
Sorting:
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 2 months ago
- ☆85May 15, 2025Updated 9 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- An offensive toolkit for restless guests #DEFCON33☆54Aug 11, 2025Updated 6 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- ☆41Feb 20, 2025Updated 11 months ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- ☆159May 5, 2025Updated 9 months ago
- A hoontr must hoont☆102Nov 27, 2025Updated 2 months ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆29Oct 13, 2025Updated 4 months ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 5 months ago
- ☆20Nov 5, 2025Updated 3 months ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Oct 8, 2023Updated 2 years ago
- ☆55May 31, 2025Updated 8 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆225Sep 19, 2025Updated 4 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 7 months ago
- ☆49Apr 9, 2025Updated 10 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated 11 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- ☆334Aug 20, 2025Updated 5 months ago
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264May 2, 2025Updated 9 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last week
- ☆58Feb 16, 2025Updated 11 months ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A reflective DLL development template for the Rust programming language☆113Nov 4, 2025Updated 3 months ago
- Location of some Active Directory lab scripts I have created and find useful☆108Feb 2, 2026Updated last week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆207Sep 20, 2025Updated 4 months ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago