MpCmdRun / uac-bypassLinks
ATL.dll and WmiMgmt.msc UAC Bypass
☆12Updated 9 months ago
Alternatives and similar repositories for uac-bypass
Users that are interested in uac-bypass are comparing it to the libraries listed below
Sorting:
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 8 months ago
- Less sugar (entropy) for your binaries☆34Updated 5 months ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Updated 7 months ago
- Unhook Ntdll.dll, Go & C++.☆32Updated 9 months ago
- converts sRDI compatible dlls to shellcode☆35Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated 2 years ago
- ☆33Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61Updated 9 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Updated 8 months ago
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆88Updated last month
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Updated 2 months ago
- Shellcode Loader Utilizing ETW Events☆67Updated 11 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52Updated last year
- a demo module for the kaine agent to execute and inject assembly modules☆41Updated last year
- ☆50Updated 7 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- ☆37Updated 3 years ago
- One-header configurable C++20 COFF loader☆21Updated 6 months ago
- ☆50Updated 8 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated last year
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 8 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- Bypassing Amsi using LdrLoadDll☆47Updated last year
- Rewrite to fit my needs☆32Updated last year
- Proxy function calls through the thread pool with ease☆31Updated 11 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Updated 5 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- demo unhooking functions in ntdll☆28Updated 6 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Updated 6 months ago