A rework of CMLuaUtil AutoElevated
☆30Nov 6, 2022Updated 3 years ago
Alternatives and similar repositories for BypassUAC
Users that are interested in BypassUAC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NanoCore rat stub source code☆40May 25, 2022Updated 3 years ago
- A small shellcode loader library written in C#☆47Dec 21, 2021Updated 4 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- Injecting shellcode into a process memory and executing it in C#☆49Oct 2, 2022Updated 3 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆16Sep 8, 2024Updated last year
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆233Nov 6, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote Access Tool Written In C#☆521Feb 25, 2026Updated last month
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 7 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Kill Everything AV/EDR☆27Nov 18, 2024Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 8 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆186Aug 2, 2023Updated 2 years ago
- Remote administration tool with native client☆46May 18, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 4 years ago
- HVNC based on RustDesk☆112May 1, 2024Updated last year
- UI for creating LNKs☆107Jun 16, 2021Updated 4 years ago
- ☆17Apr 27, 2023Updated 2 years ago
- Use ICMLuaUtil to Bypass UAC!☆629Apr 19, 2020Updated 5 years ago
- MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability☆19Jul 27, 2021Updated 4 years ago
- A simple YubiKey simulator☆22Feb 18, 2012Updated 14 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ReCopilot: Reverse Engineering Copilot in Binary Analysis☆41Dec 4, 2025Updated 4 months ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- Windows C++ Implant for Exploration C2☆45Jan 26, 2026Updated 2 months ago
- 自研C2 功能展示。cs+spark的结合体。省去了本地客户端,便于团队操作。后续开源社区版。☆16Oct 30, 2024Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆295Jul 15, 2023Updated 2 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago