HUGOW04 / BypassUAC
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims t…
☆19Updated 2 years ago
Alternatives and similar repositories for BypassUAC:
Users that are interested in BypassUAC are comparing it to the libraries listed below
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year
- Hide Port In Windows☆38Updated 3 months ago
- ☆9Updated last year
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 2 years ago
- My personal shellcode loader☆31Updated last year
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- Change hash for a signed pe☆15Updated last year
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆41Updated 2 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a …☆56Updated 3 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- ☆56Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆39Updated 3 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 2 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- shellcode-loaders and beacon-loaders☆64Updated last year
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- Indirect NT syscalls LSASS dumper.☆39Updated last year
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆33Updated 2 years ago
- 关闭恶意驱动的文件和注册表保护☆12Updated 2 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated last year
- ☆20Updated last year
- An attempt at reversing WindowsDefender☆20Updated 4 months ago
- Windows API Call Obfuscation☆99Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆65Updated 2 years ago