Trapwithme / UACBuddyLinks
UAC via computerdefaults.exe
☆12Updated 3 months ago
Alternatives and similar repositories for UACBuddy
Users that are interested in UACBuddy are comparing it to the libraries listed below
Sorting:
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆22Updated 2 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 2 months ago
- reverse engineering random malwares☆23Updated 5 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Misery Loader to bypass modern EDR solutions☆11Updated 6 months ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆27Updated last month
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- ☆54Updated 2 years ago
- ☆40Updated 4 months ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Updated 3 years ago
- A simple PE loader.☆26Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching☆11Updated 2 years ago
- ☆31Updated 3 months ago
- run process as PPL Antimalware☆10Updated last year
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Updated 3 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 2 months ago
- Ntdll Unhooking☆13Updated 2 months ago
- ☆10Updated 4 years ago
- C# API for Nidhogg rootkit☆17Updated last year
- ☆30Updated 4 years ago
- Dangling COM Keys Finder☆17Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆56Updated 3 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆10Updated 2 months ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Non organized Cpp code files I used for my research on Windows☆25Updated 4 years ago
- ☆15Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year