alphaSeclab / bypass-uac
☆57Updated 6 years ago
Alternatives and similar repositories for bypass-uac:
Users that are interested in bypass-uac are comparing it to the libraries listed below
- Small tool to load shellcodes or PEs to analyze them☆81Updated 6 years ago
- No inline asm,support x86/x64☆64Updated 3 years ago
- ☆91Updated 3 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆84Updated 3 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- cve-2019-0808-poc☆48Updated 6 years ago
- Penetration test☆55Updated 3 years ago
- 感染MBR 下载并运行文件。☆33Updated 2 years ago
- Rapid generation ShellCode☆60Updated 7 years ago
- ☆32Updated 7 years ago
- Kernel file/process/object tool☆65Updated 3 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- ☆36Updated 4 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- Windows CVE主防(HIPS/HIDS)☆54Updated 3 years ago
- Play Doh Windows ACL Tools☆61Updated 2 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Updated 6 years ago
- Copy xRAT repository☆22Updated 6 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆43Updated 11 years ago
- 加密壳☆33Updated 5 years ago
- ☆20Updated 4 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- ☆19Updated 9 years ago
- Add export function and convert exe to dll☆25Updated 4 years ago
- My pentest tools used two years ago. Part1☆17Updated 7 years ago
- powershell to hide process by kd.exe☆32Updated 3 years ago
- CVE-2018-15982_EXP_IE☆11Updated 6 years ago
- 过去写的一些Windows安全研究相关代码☆135Updated 6 years ago
- inject dll from kernal mode to user mode process use Apc☆32Updated 5 years ago
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆81Updated 4 years ago