ScriptKiddieTutorials / Bypass-UAC
pwn
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Bypass-UAC
- AMSI Bypass for powershell☆30Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆36Updated 2 years ago
- Another AMSI bypass - but in C++.☆23Updated last year
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆10Updated 2 years ago
- A python port of CCob's ThreadlessInject☆26Updated last year
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆36Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆34Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated last year
- Generate droppers with encrypted payloads automatically.☆54Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- ☆15Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆81Updated last year
- ☆18Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆16Updated 3 years ago
- A simple injector that uses LoadLibraryA☆16Updated 4 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆49Updated 3 years ago
- ☆16Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year