AdvancedHacker101 / Bypass-Uac
Small utility written in c++ to bypass windows UAC prompt
☆38Updated 6 years ago
Related projects: ⓘ
- Remote Administration Tool For Windows☆13Updated 6 years ago
- Add export function and convert exe to dll☆25Updated 4 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆34Updated 5 years ago
- PoC designed to evade userland-hooking anti-virus.☆85Updated 5 years ago
- Use NT Native Registry API to create a registry that normal user can not query.☆54Updated 6 years ago
- A ready-made template for a project based on libpeconv.☆40Updated last year
- Copy xRAT repository☆22Updated 6 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆44Updated 7 years ago
- ☆58Updated this week
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- Convert PE files to a shellcode☆73Updated 4 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆54Updated 5 years ago
- No inline asm,support x86/x64☆63Updated 3 years ago
- ☆57Updated 6 years ago
- ☆63Updated last year
- ☆88Updated 3 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆36Updated 7 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- A simple rootkit to hide a process☆44Updated 10 years ago
- x86/x64 dll injector☆28Updated 2 years ago
- PoC for detecting and dumping process hollowing code injection☆50Updated 5 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆88Updated 2 years ago
- ☆44Updated this week
- Protects deletion of files with a specified extension using a kernel-mode driver.☆73Updated 6 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 3 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆13Updated last year
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆52Updated last year
- Analyze and attack windows applications using dll hijacking vulnerabilities☆54Updated 4 years ago
- ☆10Updated this week