HUGOW04 / BypassUAC
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims t…
☆17Updated last year
Related projects: ⓘ
- Change hash for a signed pe☆15Updated last year
- Convert native dll to shellcode, and support exported function☆22Updated 3 years ago
- Hide Port In Windows☆37Updated last year
- golang String Obfuscate☆9Updated 2 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 2 years ago
- ☆23Updated this week
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated last year
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆41Updated last year
- ☆13Updated this week
- Executes shellcode from a remote server and aims to evade in-memory scanners☆29Updated 4 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- An unfinished DOUBLEPULSAR clone. Set to be redone at a later date☆13Updated last year
- Simple reverse shell to avoid Windows defender and kaspersky detection☆18Updated 2 years ago
- ☆54Updated 2 years ago
- ☆9Updated 7 months ago
- ComObject Shellcode Loader with fake return address☆12Updated 2 years ago
- Indirect NT syscalls LSASS dumper.☆28Updated last year
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 2 years ago
- ☆25Updated this week
- ☆10Updated this week
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆28Updated last year
- Utilizing Alternative Shellcode Execution Via Callbacks☆12Updated 9 months ago
- My personal shellcode loader☆33Updated last year
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆28Updated 2 years ago
- Load PE via XML Attribute☆28Updated 4 years ago
- Cobaltstrike BOF to unhook any Nt api☆14Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆52Updated 4 months ago
- Collection of shellcode injection and execution techniques☆17Updated 3 years ago