Wh04m1001 / IFaultrepElevatedDataCollectionUACLinks
☆133Updated 3 years ago
Alternatives and similar repositories for IFaultrepElevatedDataCollectionUAC
Users that are interested in IFaultrepElevatedDataCollectionUAC are comparing it to the libraries listed below
Sorting:
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- ☆160Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆170Updated 11 months ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆173Updated 2 years ago
- Identify and exploit leaked handles for local privilege escalation.☆110Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆131Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆127Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 3 years ago
- ☆88Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 2 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆149Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆107Updated last year
- Dumping LSASS with a duplicated handle from custom LSA plugin☆202Updated 3 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆214Updated 3 years ago
- Winsocket for Cobalt Strike.☆100Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆220Updated 3 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆177Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆120Updated 2 years ago
- PE obfuscator with Evasion in mind☆213Updated 2 years ago
- Weaponized HellsGate/SigFlip☆203Updated 2 years ago
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆194Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆178Updated 3 years ago
- ☆142Updated 2 years ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year