blue0x1 / uac-bypass-onelinersLinks
Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applications to elevate privileges.
☆150Updated last year
Alternatives and similar repositories for uac-bypass-oneliners
Users that are interested in uac-bypass-oneliners are comparing it to the libraries listed below
Sorting:
- Dynamic shellcode loader with sophisticated evasion capabilities☆277Updated 3 months ago
- Ghosting-AMSI☆220Updated 8 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆253Updated last year
- ☆259Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆184Updated 10 months ago
- Hide your P/Invoke signatures through other people's signed assemblies☆212Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆184Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- ☆242Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆135Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆263Updated 9 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆230Updated 11 months ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- early cascade injection PoC based on Outflanks blog post☆236Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆182Updated 2 years ago
- A PowerShell console in C/C++ with all the security features disabled☆340Updated 3 months ago
- Extracting NetNTLM without touching lsass.exe☆240Updated 2 years ago
- Adversary Emulation Framework☆129Updated 6 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆278Updated last year
- Build sneaky & malicious LNK files.☆158Updated 6 months ago
- Shaco is a linux agent for havoc☆169Updated 2 years ago
- ☆186Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆187Updated 8 months ago
- Sleep obfuscation☆260Updated last year
- RunPE implementation with multiple evasive techniques (2)☆265Updated 3 months ago
- A PoC for Early Cascade process injection technique.☆206Updated 11 months ago