UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and FuzzySecurity for their efforts
☆33Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for WusaBypassUAC
Users that are interested in WusaBypassUAC are comparing it to the libraries listed below
Sorting:
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 7 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆125Feb 13, 2023Updated 3 years ago
- ☆23Mar 6, 2023Updated 3 years ago
- ☆86Jan 21, 2025Updated last year
- ☆11Apr 30, 2021Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆96Jan 5, 2026Updated 2 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆95Aug 21, 2025Updated 6 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166May 28, 2025Updated 9 months ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated last month
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ☆82Apr 9, 2024Updated last year
- SetWinEventHook Sample☆50Sep 23, 2023Updated 2 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆54Feb 29, 2024Updated 2 years ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆116Dec 21, 2025Updated 2 months ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- ☆11Aug 8, 2022Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated last month
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- CPL remote trigger☆43Dec 28, 2025Updated 2 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Bypass EDR(Endpoint Detection and Response) environment to write Behinder jsp webshell onto webserver☆13Dec 27, 2023Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 3 months ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- base on winHttp to develep download☆12Apr 14, 2018Updated 7 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- # Bash Encrypter & Decrypter☆15Sep 3, 2022Updated 3 years ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago