bartblaze / dccwUACBypass
PowerShell script to bypass UAC using DCCW
☆18Updated 7 years ago
Alternatives and similar repositories for dccwUACBypass:
Users that are interested in dccwUACBypass are comparing it to the libraries listed below
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆10Updated 8 years ago
- ☆18Updated 7 years ago
- ☆25Updated 6 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- ☆10Updated 7 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- A simple reflective dll example☆19Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Fuzzing Framework☆10Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- ☆16Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago