Mrakovic-ORG / Privilege_Escalation
UAC Bypass for windows
☆37Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Privilege_Escalation
- A tool to automatically defeat .NET crackmes based on string equality comparisons☆18Updated 2 years ago
- Lists of .NET Obfuscators - comparative list of available products☆18Updated 4 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆40Updated 2 years ago
- Simple way to disable/rename buttons from a task manager☆31Updated 4 years ago
- Changes the window titles of running processes.☆10Updated 5 years ago
- POC runtime crypter☆8Updated 5 years ago
- Polymorph file protector☆41Updated 5 years ago
- A deobfuscator for Atomic obfuscator☆11Updated 4 years ago
- Detect virtual environment☆60Updated 5 years ago
- C# Codedom example / builder☆23Updated 4 years ago
- Make more then 100k r/s with HTTP Sockets☆11Updated 4 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 7 years ago
- Similar to server sided variables and used to download files without giving away a direct download URL.☆16Updated 3 years ago
- Strong obfuscator for .NET files☆14Updated 4 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆63Updated 5 years ago
- Injecting shellcode into a process memory and executing it in C#☆49Updated 2 years ago
- Overwrites the whole PE Header☆16Updated 4 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Updated 8 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Public ArchangelCloak Deobfuscator☆24Updated 5 years ago