Bypassing User Account Control (UAC) using TpmInit.exe
☆131Sep 26, 2016Updated 9 years ago
Alternatives and similar repositories for TpmInitUACBypass
Users that are interested in TpmInitUACBypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆66Jan 17, 2018Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆65May 26, 2016Updated 9 years ago
- PowerShell Runspace Connect-Back Shell☆26Dec 31, 2015Updated 10 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Jul 14, 2016Updated 9 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆692Dec 29, 2017Updated 8 years ago
- Pafish4vs is based on [Pafish]( https://github.com/a0rtega/pafish) , just ported to the VS (VC) compiler (X64 , X86) .☆12Aug 19, 2016Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆47Jun 10, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆142Apr 21, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆601Jul 18, 2021Updated 4 years ago
- MSBuildShell, a Powershell Host running within MSBuild.exe☆294Aug 2, 2019Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Win32k LPE vulnerability used in APT attack☆291Dec 18, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Mar 28, 2017Updated 9 years ago
- simple PE packer written in C++☆56Feb 23, 2018Updated 8 years ago
- IDA PDB Loader☆49Sep 21, 2018Updated 7 years ago