Wh04m1001 / IFaultrepElevatedDataCollectionUACLinks
☆133Updated 3 years ago
Alternatives and similar repositories for IFaultrepElevatedDataCollectionUAC
Users that are interested in IFaultrepElevatedDataCollectionUAC are comparing it to the libraries listed below
Sorting:
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Updated 3 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆174Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- ☆88Updated 3 years ago
- ☆161Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆202Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆132Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆128Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆111Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Updated 4 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆120Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆216Updated 4 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆180Updated 2 years ago
- PE obfuscator with Evasion in mind☆213Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆179Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- Building and Executing Position Independent Shellcode from Object Files in Memory☆161Updated 4 years ago
- Weaponized HellsGate/SigFlip☆205Updated 2 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Updated 3 years ago
- It stinks☆102Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 3 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆101Updated 3 years ago
- Winsocket for Cobalt Strike.☆101Updated 2 years ago