DoubleLabyrinth / BypassUACLinks
A tool that helps you get system shell without UAC prompt
☆49Updated 7 years ago
Alternatives and similar repositories for BypassUAC
Users that are interested in BypassUAC are comparing it to the libraries listed below
Sorting:
- ☆92Updated 4 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Updated 6 years ago
- ☆43Updated 2 years ago
- 几个UAC Bypass的方法☆12Updated 7 years ago
- Load dll/exe from memory. Support .NET "AnyCPU" platform!☆60Updated last year
- A better alternative to RunDLL32☆33Updated 6 years ago
- ☆19Updated 9 years ago
- 一个windows反汇编工具,界面风格防OllyDbg 利用业余开发了一款类似仿OLlyDbg界面的 IDA静态反编译工具,目前是1.0版本,功能不是很强 大但是基本功能有了☆71Updated 9 months ago
- Loading a native DLL in the memory.☆70Updated 7 years ago
- One DLL to redirect them all to SOCKS4 server.☆24Updated 6 years ago
- 简单的Linux远程控制☆20Updated 8 years ago
- ☆72Updated 9 years ago
- ☆46Updated 7 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Updated 4 years ago
- simple shellcode loader for linux & win, x86 & x64☆34Updated 9 years ago
- Win32k Elevation of Privilege Poc☆82Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- Exported from https://code.google.com/archive/p/hookme/☆43Updated 9 years ago
- EoP POC for CVE-2019-1132☆61Updated 6 years ago
- Small tool to load shellcodes or PEs to analyze them☆83Updated 7 years ago
- Bootkit for Windows 7☆27Updated 11 years ago
- ☆18Updated 10 years ago
- Demos for Presentation on Windows Runtime Security☆70Updated 7 years ago
- No inline asm,support x86/x64☆67Updated 4 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆52Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 6 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 10 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 6 years ago