A tool that helps you get system shell without UAC prompt
☆50Oct 8, 2018Updated 7 years ago
Alternatives and similar repositories for BypassUAC
Users that are interested in BypassUAC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 22, 2019Updated 6 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 2 months ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Mar 13, 2019Updated 7 years ago
- A library that can map one IP-Port to another IP-Port.☆30Jun 11, 2019Updated 6 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 7 years ago
- base on winHttp to develep download☆12Apr 14, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- 陈列一堆用python写的黑客脚本工具☆11Apr 19, 2019Updated 6 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 7 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- Encrypts and loads encrypted DLLs☆57Nov 14, 2018Updated 7 years ago
- A linux-like su/sudo on Windows. Transferred from https://github.com/DoubleLabyrinth/WindowsSudo.☆33Oct 12, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- windows 黑客技术编程技术详解配套的代码资源☆16Mar 5, 2020Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- fastjson-1.2.61-RCE☆33Sep 26, 2019Updated 6 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- 通过调用zoomeye来获取安装JBoss机器的地址,然后通过HEAD请求植入webshell。 wxPython写了一个界面的控制程序。☆12Mar 28, 2018Updated 8 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- ☆127Apr 8, 2019Updated 7 years ago
- ☆14Oct 25, 2019Updated 6 years ago