NDevTK / UACSpoof
Spoofing the Windows UAC "verified" publisher :)
☆13Updated last year
Alternatives and similar repositories for UACSpoof:
Users that are interested in UACSpoof are comparing it to the libraries listed below
- This Tampermonkey script makes X a more tolerable experience.☆9Updated last year
- KethoMemoryToolKit is a set of tools used by me to change OPCODES of the memory of any process running in the operating system of specifi…☆7Updated 3 years ago
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆41Updated 2 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆15Updated 5 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆16Updated 3 weeks ago
- EAPPX/EMSIX decryption and extraction☆21Updated 7 months ago
- Website for iLeakage: Browser-based Speculative Execution Attacks on Apple Devices.☆12Updated 5 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 2 months ago
- FOSS Patcher in Batchfile for Windows Users to bypass Windows 11 Restrictions - Unfinished☆16Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated 9 months ago
- ☆14Updated 5 months ago
- ☆44Updated last year
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆103Updated 2 years ago
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆15Updated 9 months ago
- using the gpu to hide your payload☆53Updated 2 years ago
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆25Updated 4 months ago
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆53Updated last year
- Exploit POC for CVE-2024-36877☆46Updated 5 months ago
- Convert batch script to executable with advanced obfuscator. Based on Batch-Obfuscator bat2exe very advanced and very well made.☆13Updated 3 years ago
- Less Privileged AppContainer (LPAC) Sandbox for Firefox☆15Updated last week
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆42Updated 10 months ago
- Codes that could trigger BSOD (Blue Screen of Death) on Windows.☆17Updated 2 weeks ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆16Updated 3 years ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆51Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated last year
- Documentation of Microsoft's Warbird obfuscation☆25Updated 5 months ago
- ☆16Updated 5 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆22Updated 6 months ago