MpCmdRun / uac-bypassLinks
ATL.dll and WmiMgmt.msc UAC Bypass
☆12Updated 9 months ago
Alternatives and similar repositories for uac-bypass
Users that are interested in uac-bypass are comparing it to the libraries listed below
Sorting:
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- converts sRDI compatible dlls to shellcode☆35Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Updated 6 months ago
- One-header configurable C++20 COFF loader☆21Updated 6 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Updated 7 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆28Updated 8 months ago
- Unhook Ntdll.dll, Go & C++.☆32Updated 9 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Updated 3 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Updated last month
- ☆53Updated 4 months ago
- Threadless shellcode injection tool☆68Updated last year
- ☆50Updated 8 months ago
- BypassCredGuard CS BOF☆48Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated last year
- ☆33Updated last year
- Rewrite to fit my needs☆32Updated last year
- Less sugar (entropy) for your binaries☆34Updated 5 months ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆128Updated 2 weeks ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 8 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆48Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆61Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆49Updated 7 months ago
- Shellcode Loader Utilizing ETW Events☆67Updated 11 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Updated 9 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Updated 5 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52Updated last year
- ☆49Updated 9 months ago
- ☆50Updated 7 months ago