PoCs of (outdated) privilege escalation vulnerability
☆12Dec 31, 2024Updated last year
Alternatives and similar repositories for Bypass-UAC
Users that are interested in Bypass-UAC are comparing it to the libraries listed below
Sorting:
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26May 9, 2019Updated 6 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Jul 12, 2021Updated 4 years ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆16Dec 21, 2021Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last month
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago
- ☆13Jan 27, 2024Updated 2 years ago
- All contest materials for CALICO Spring '24, including problem statements, templates, tests, solutions, scripts, and editorials.☆10Apr 29, 2024Updated last year
- Open-source challenges for Naumachia☆13Sep 18, 2023Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- OSCP Cheatsheet☆16Jun 14, 2023Updated 2 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- ☆127Mar 7, 2026Updated last week
- Proof of Concepts of vulnerabilities discovered by me☆11Jan 24, 2024Updated 2 years ago
- ☆11Mar 7, 2021Updated 5 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- 参照xffhelper源码修改,结合了fakeip的功能,生成jar包,不再需要py支持☆14Jun 10, 2021Updated 4 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 10 months ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Sep 30, 2021Updated 4 years ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 4 years ago
- Create your own powershell, malware desktop app or even clickjacking web with a single command for unix and windows systems.☆17May 26, 2019Updated 6 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Aug 10, 2020Updated 5 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- An easy GUI editor for CustomTKinter in Python☆20Apr 20, 2024Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 11 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- Samples for midPoint project☆21Feb 13, 2026Updated last month