TheKevinWang / UACHooker
Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.
☆20Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for UACHooker
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆27Updated 3 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆14Updated 3 years ago
- ☆15Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆38Updated last year
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆52Updated last year
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆31Updated 2 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- PE Injection with ring3 hook bypass☆10Updated 3 years ago
- API Hammering with C++20☆34Updated 2 years ago
- Bypass UAC by abusing shell protocol handlers☆13Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Just another casual shellcode native loader☆24Updated 2 years ago
- Process Injection: APC Injection☆27Updated 3 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆16Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆28Updated 2 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 3 years ago
- Process Hollowing demonstration & explanation☆32Updated 3 years ago
- Simple and sane compression wrapper library.☆18Updated 2 years ago
- A simple PE loader.☆25Updated last year
- ProcessHollowing via csharp☆12Updated 2 years ago
- Implementation of ITaskHandler in C++☆12Updated last year