DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
☆42May 18, 2024Updated last year
Alternatives and similar repositories for C2_Elevated_Shell_DLL_Hijcking
Users that are interested in C2_Elevated_Shell_DLL_Hijcking are comparing it to the libraries listed below
Sorting:
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆110Feb 17, 2025Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆265Oct 23, 2022Updated 3 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 6 months ago
- shell code example☆68Dec 12, 2025Updated 3 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Feb 6, 2026Updated last month
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆98Mar 20, 2023Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Jul 25, 2023Updated 2 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆290May 27, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- a simple C++ tool using the windows registry to disable windows defender☆13Sep 7, 2021Updated 4 years ago
- Winsocket for Cobalt Strike.☆104Jul 6, 2023Updated 2 years ago
- Position-independent Reflective Loader for macOS☆120Feb 19, 2026Updated last month
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- Reflective DLL Injection Made Bella☆251Jan 6, 2025Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 2 months ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆455Feb 19, 2026Updated last month