Wh04m1001 / IFaultrepElevatedDataCollectionUACLinks
☆133Updated 3 years ago
Alternatives and similar repositories for IFaultrepElevatedDataCollectionUAC
Users that are interested in IFaultrepElevatedDataCollectionUAC are comparing it to the libraries listed below
Sorting:
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆175Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- ☆161Updated 2 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆101Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆203Updated 3 years ago
- Winsocket for Cobalt Strike.☆101Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆128Updated 3 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Updated last year
- ☆88Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- AV/EDR evasion via direct system calls.☆108Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 3 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memory☆165Updated 4 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 3 years ago
- PE obfuscator with Evasion in mind☆214Updated 2 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆75Updated 3 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆123Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- Weaponized HellsGate/SigFlip☆205Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆108Updated 2 years ago
- It stinks☆103Updated 3 years ago
- Exploring in-memory execution of .NET☆138Updated 3 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆182Updated 2 years ago
- ☆144Updated 2 years ago