blue0x1 / uac-bypass-oneliners
Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applications to elevate privileges.
☆100Updated last month
Alternatives and similar repositories for uac-bypass-oneliners:
Users that are interested in uac-bypass-oneliners are comparing it to the libraries listed below
- Just another C2 Redirector using CloudFlare.☆86Updated 9 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆82Updated last month
- ☆139Updated 6 months ago
- Sleep obfuscation☆208Updated 2 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆55Updated 7 months ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆184Updated last week
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆157Updated 8 months ago
- Havoc C2 profile generator☆70Updated 3 months ago
- Recursive Loader☆101Updated 4 months ago
- ☆120Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- ☆164Updated 3 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆85Updated 8 months ago
- Windows Kernel Offensive Toolset☆119Updated 5 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆147Updated last year
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- A Mythic Agent written in PIC C.☆171Updated 2 weeks ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆115Updated last month
- ☆122Updated 5 months ago
- Bypass LSA protection using the BYODLL technique☆154Updated 5 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆180Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆172Updated 2 months ago
- A set of programs for analyzing common vulnerabilities in COM☆193Updated 5 months ago
- .bin file to shellcode convertor☆33Updated 7 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Shaco is a linux agent for havoc☆156Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 8 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated 11 months ago