Vozzie / uacscriptLinks
Windows 7 UAC Bypass Vulnerability in the Windows Script Host
☆105Updated 9 years ago
Alternatives and similar repositories for uacscript
Users that are interested in uacscript are comparing it to the libraries listed below
Sorting:
- Yet another AV evasion tool☆119Updated 3 years ago
- ☆129Updated 10 years ago
- ☆74Updated 2 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 8 years ago
- ☆138Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- ☆83Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 10 years ago
- Listening Post for Throwback Implant☆110Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- some pocs for antivirus evasion☆131Updated last year
- This is a pack of Cortana scripts commonly used on our pentests.☆69Updated 10 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 8 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆146Updated 10 years ago
- ☆97Updated 9 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆128Updated 8 years ago
- DefCon24☆121Updated 8 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆104Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- ☆79Updated 9 years ago
- Wrappers around smbclient and winexe with PTH support☆33Updated 9 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆137Updated 7 years ago
- A "tiny" meterpreter stager☆128Updated 5 years ago
- ☆34Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago