Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
☆18Jul 12, 2021Updated 4 years ago
Alternatives and similar repositories for byeintegrity4-uac
Users that are interested in byeintegrity4-uac are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆57Jul 12, 2021Updated 4 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆12May 17, 2019Updated 6 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Multipurpose malware framework☆28Dec 6, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 5 years ago
- Personal curation of Clang/LLVM patches.☆12Feb 27, 2021Updated 5 years ago
- Windows (ShadowMove) Socket Duplication☆88Apr 19, 2020Updated 5 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- HVNC using virtual desktop☆10Dec 30, 2020Updated 5 years ago
- ☆61Oct 24, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An example of PE hollowing injection technique☆26Jun 28, 2019Updated 6 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated last year
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆250Aug 13, 2020Updated 5 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Feb 19, 2023Updated 3 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago
- inProxy is a cross-platform web debugging proxy that let you capture, inspect, analyze, manipulate and mock all the HTTP, HTTPS and WebSo…☆14Jan 2, 2021Updated 5 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆41Jun 18, 2021Updated 4 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆342Jul 30, 2017Updated 8 years ago
- ☆26Sep 17, 2017Updated 8 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆51Dec 19, 2023Updated 2 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆212Nov 21, 2021Updated 4 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- ☆49May 12, 2021Updated 4 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- Yara Based Detection Engine for web browsers☆50Sep 5, 2021Updated 4 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Jul 20, 2016Updated 9 years ago