HUGOW04 / BypassUACLinks
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims t…
☆17Updated 2 years ago
Alternatives and similar repositories for BypassUAC
Users that are interested in BypassUAC are comparing it to the libraries listed below
Sorting:
- Hide Port In Windows☆40Updated 10 months ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆36Updated 2 years ago
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- ☆32Updated 5 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆57Updated 2 months ago
- 简单版的PE加载器☆11Updated 5 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Updated 3 years ago
- Detect BypassUAC using AMSI☆26Updated 6 months ago
- 简单安排一下 autochk.sys 这个rootkit☆73Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 3 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Updated 3 years ago
- My personal shellcode loader☆31Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一 些☆17Updated 2 years ago
- ☆33Updated 2 years ago
- Change hash for a signed pe☆16Updated 2 years ago
- bypass UAC even when configured to always notify user☆30Updated 4 years ago
- shellcode-loaders and beacon-loaders☆70Updated last year
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 3 years ago
- 优化了GetSystemEarlyBird的代码结构☆21Updated 5 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Updated 5 years ago
- Three different shellcode techniques on the Windows Kernel☆13Updated 5 months ago
- ☆41Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- Code with Windows Hacker☆12Updated 2 years ago
- ☆56Updated 3 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆36Updated 2 months ago
- Load the evilDLL from socket connection without touch disk☆17Updated 4 years ago
- Re-implement cmd.exe using windows api☆49Updated 2 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆14Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago