Trapwithme / UACBuddyLinks
UAC via computerdefaults.exe
☆12Updated 2 months ago
Alternatives and similar repositories for UACBuddy
Users that are interested in UACBuddy are comparing it to the libraries listed below
Sorting:
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 2 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated 2 months ago
- Ntdll Unhooking☆12Updated 2 months ago
- ☆40Updated 4 months ago
- reverse engineering random malwares☆23Updated 4 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 2 months ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Change hash for a signed pe☆16Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆9Updated 2 months ago
- run process as PPL Antimalware☆10Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆21Updated 3 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- Misery Loader to bypass modern EDR solutions☆11Updated 6 months ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- ☆31Updated 2 months ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆31Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆30Updated 10 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆10Updated 3 years ago
- kASLR bypass technique on Intel CPUs.☆14Updated last month
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- Dangling COM Keys Finder☆17Updated 3 years ago
- golang String Obfuscate☆9Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- An attempt at reversing WindowsDefender☆20Updated 8 months ago