Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
☆30Jul 12, 2021Updated 4 years ago
Alternatives and similar repositories for byeintegrity3-uac
Users that are interested in byeintegrity3-uac are comparing it to the libraries listed below
Sorting:
- Bypass UAC by abusing the Internet Explorer Add-on installer☆57Jul 12, 2021Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Jul 12, 2021Updated 4 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆212Nov 21, 2021Updated 4 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆31Nov 9, 2021Updated 4 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- A lightweight x86/x64 VM☆18Feb 7, 2021Updated 5 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- 💉 Personal project that I inject into games for debugging☆20Nov 30, 2016Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- ☆23May 28, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆41Sep 23, 2021Updated 4 years ago
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆71Nov 5, 2021Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- Custom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemo…☆127Jan 18, 2022Updated 4 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- ☆175Oct 2, 2024Updated last year
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- APC注入DLL内核层☆23Dec 8, 2018Updated 7 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- ☆22Oct 20, 2020Updated 5 years ago
- Analyze Windows x64 Kernel Memory Layout☆129Nov 19, 2020Updated 5 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- OD反汇编引擎精简版,只适合x86系统,可嵌入驱动程序。☆10Mar 29, 2018Updated 7 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago