MpCmdRun / uac-bypassLinks
ATL.dll and WmiMgmt.msc UAC Bypass
☆12Updated 9 months ago
Alternatives and similar repositories for uac-bypass
Users that are interested in uac-bypass are comparing it to the libraries listed below
Sorting:
- converts sRDI compatible dlls to shellcode☆35Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Updated 7 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- One-header configurable C++20 COFF loader☆21Updated 6 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- ☆49Updated 7 months ago
- ☆53Updated 4 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 7 months ago
- Less sugar (entropy) for your binaries☆34Updated 4 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆126Updated last month
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Updated 3 months ago
- Shellcode Loader using indirect syscalls☆16Updated 2 years ago
- Golang Implementation of Hell's gate☆21Updated 2 years ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Updated 3 weeks ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Updated 5 months ago
- Unhook Ntdll.dll, Go & C++.☆32Updated 9 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated last year
- ☆50Updated 6 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆42Updated 9 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Updated 5 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆60Updated last month
- Thats it! An Open-Source Windows UEFI Rootkit☆28Updated 6 months ago
- BypassCredGuard CS BOF☆48Updated last year
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆48Updated 2 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Updated 6 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- Shellcode Loader Utilizing ETW Events☆67Updated 11 months ago
- Proxy function calls through the thread pool with ease☆31Updated 11 months ago