Yet-Zio / WusaBypassUACView external linksLinks
UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and FuzzySecurity for their efforts
☆33Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for WusaBypassUAC
Users that are interested in WusaBypassUAC are comparing it to the libraries listed below
Sorting:
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 6 months ago
- ☆22Mar 6, 2023Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆125Feb 13, 2023Updated 3 years ago
- ☆86Jan 21, 2025Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆11Apr 30, 2021Updated 4 years ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆91Aug 21, 2025Updated 5 months ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166May 28, 2025Updated 8 months ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated 2 weeks ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆26Nov 14, 2025Updated 3 months ago
- ☆82Apr 9, 2024Updated last year
- SetWinEventHook Sample☆50Sep 23, 2023Updated 2 years ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆53Feb 29, 2024Updated last year
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆113Dec 21, 2025Updated last month
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆31Updated this week
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago
- ☆11Aug 8, 2022Updated 3 years ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- CPL remote trigger☆43Dec 28, 2025Updated last month
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last week
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆17Jun 29, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- base on winHttp to develep download☆12Apr 14, 2018Updated 7 years ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- # Bash Encrypter & Decrypter☆15Sep 3, 2022Updated 3 years ago
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆32Jun 23, 2022Updated 3 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆286Jan 21, 2024Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 6 months ago