blue0x1 / uac-bypass-onelinersLinks
Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applications to elevate privileges.
☆141Updated 10 months ago
Alternatives and similar repositories for uac-bypass-oneliners
Users that are interested in uac-bypass-oneliners are comparing it to the libraries listed below
Sorting:
- Dynamic shellcode loader with sophisticated evasion capabilities☆253Updated last month
- A POC to disable TamperProtection and other Defender / MDE components☆232Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆87Updated 6 months ago
- ☆259Updated last year
- Ghosting-AMSI☆220Updated 6 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 8 months ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆166Updated last year
- ☆218Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆262Updated 7 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆159Updated 3 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆131Updated 10 months ago
- 「💀」Proof of concept on BYOVD attack☆164Updated 11 months ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Updated last year
- Extracting NetNTLM without touching lsass.exe☆239Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated 11 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 3 months ago
- ☆201Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆165Updated last year
- Shaco is a linux agent for havoc☆167Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post☆232Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Updated last year
- Adversary Emulation Framework☆126Updated 4 months ago
- ☆185Updated 5 months ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆219Updated this week
- RunPE implementation with multiple evasive techniques☆241Updated last month
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆198Updated last year
- Build sneaky & malicious LNK files.☆152Updated 4 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- The best powershell obfuscator ever made☆117Updated 3 months ago