avi7611 / UAC-BypassView external linksLinks
A shot code to Bypass UAC in Windows.
☆26Apr 13, 2022Updated 3 years ago
Alternatives and similar repositories for UAC-Bypass
Users that are interested in UAC-Bypass are comparing it to the libraries listed below
Sorting:
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- ☆14Jun 2, 2025Updated 8 months ago
- TXT and PDF documents from the NSA☆15Mar 24, 2015Updated 10 years ago
- ☆14Sep 29, 2021Updated 4 years ago
- ☆23Apr 22, 2020Updated 5 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- ☆27Mar 22, 2019Updated 6 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- darknet crawler to map links☆10Apr 15, 2020Updated 5 years ago
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆22Updated this week
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- ☆11Updated this week
- A KEDA external scaler for the Durable Task Azure Storage backend.☆10Updated this week
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Python based modular control simulation kickass toolbox☆11Sep 30, 2025Updated 4 months ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- An all-in-one WiFi pentesting tool designed to automate and simplify WiFi security auditing and attacks — phishing, SSID spam, DoS, and m…☆32Jun 24, 2025Updated 7 months ago
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- Kismet website generation & documentation data☆12Feb 7, 2026Updated last week
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- A few GitHub workflows and support code to help with Git for Windows' day-to-day tasks☆14Updated this week
- Amazon S3-compatible storage backend for openBalena☆14Updated this week
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆17Sep 30, 2022Updated 3 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 6 months ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- ☆14Apr 29, 2019Updated 6 years ago
- Mastering Convolutional Neural Networks☆11Sep 14, 2020Updated 5 years ago
- integration between FreeTAKServer and Meshtastic using MQTT and Node red☆12Feb 2, 2025Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago