DoubleLabyrinth / BypassUACLinks
A tool that helps you get system shell without UAC prompt
☆49Updated 6 years ago
Alternatives and similar repositories for BypassUAC
Users that are interested in BypassUAC are comparing it to the libraries listed below
Sorting:
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆84Updated 6 years ago
- ☆92Updated 4 years ago
- ☆43Updated last year
- 简单的Linux远程控制☆20Updated 8 years ago
- A better alternative to RunDLL32☆31Updated 6 years ago
- 几个UAC Bypass的方法☆12Updated 7 years ago
- Load dll/exe from memory. Support .NET "AnyCPU" platform!☆60Updated last year
- ☆19Updated 9 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Updated 4 years ago
- ☆18Updated 10 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- Loading a native DLL in the memory.☆69Updated 7 years ago
- ☆70Updated 8 years ago
- Win32k Elevation of Privilege Poc☆81Updated 6 years ago
- 驱动层拦截web访问源码☆30Updated 7 years ago
- simple shellcode loader for linux & win, x86 & x64☆33Updated 8 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Updated 2 years ago
- One DLL to redirect them all to SOCKS4 server.☆24Updated 5 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Updated 8 years ago
- 一个windows反汇编工具,界面风格防OllyDbg 利用业余开发了一款类似仿OLlyDbg界面的 IDA静态反编译工具, 目前是1.0版本,功能不是很强大但是基本功能有了☆71Updated 5 months ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 8 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 10 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- pwn & ctf tools for windows☆26Updated 5 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- ☆45Updated 7 years ago
- Small tool to load shellcodes or PEs to analyze them☆82Updated 7 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆52Updated 7 years ago
- Bootkit for Windows 7☆29Updated 11 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago