arsium / BypassUAC
A rework of CMLuaUtil AutoElevated
☆24Updated 2 years ago
Alternatives and similar repositories for BypassUAC:
Users that are interested in BypassUAC are comparing it to the libraries listed below
- NanoCore rat stub source code☆34Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated last year
- Windows shellcode encoding and encrypting tool☆21Updated 2 years ago
- My personal shellcode loader☆32Updated 2 years ago
- ✔A script that turns off Windows Defender☆23Updated 2 years ago
- A small shellcode loader library written in C#☆45Updated 3 years ago
- ☆20Updated last year
- Akame is an open-source, UD shellcode loader written in C++17.☆19Updated 8 months ago
- Bypassing ETW with Csharp☆26Updated 3 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Updated 4 years ago
- Load static-compiled PE from remote server.☆60Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Extracting Syscall Stub, Modernized☆63Updated 2 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆46Updated 10 months ago
- ☆39Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated 11 months ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆62Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- MappingInjection via csharp☆38Updated 3 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆83Updated last year
- BitRat Source Code☆40Updated 4 years ago
- ProcessHollowing via csharp☆12Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆67Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Inject shellcode into process via "EarlyBird"☆26Updated 3 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆58Updated 10 months ago