Wh04m1001 / IFaultrepElevatedDataCollectionUACLinks
☆133Updated 3 years ago
Alternatives and similar repositories for IFaultrepElevatedDataCollectionUAC
Users that are interested in IFaultrepElevatedDataCollectionUAC are comparing it to the libraries listed below
Sorting:
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆142Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 3 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆174Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- ☆88Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆128Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆202Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 3 years ago
- ☆161Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆132Updated 3 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆181Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆123Updated 2 years ago
- It stinks☆103Updated 3 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Updated 4 years ago
- ☆143Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated last year
- This is my own implementation of the Perun's Fart technique by Sektor7☆72Updated 3 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- Simple windows rpc server for research purposes only☆83Updated 3 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- PE obfuscator with Evasion in mind☆214Updated 2 years ago
- Exploring in-memory execution of .NET☆139Updated 3 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆132Updated 2 years ago
- Weaponized HellsGate/SigFlip☆207Updated 2 years ago