blue0x1 / uac-bypass-onelinersLinks
Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applications to elevate privileges.
☆147Updated 11 months ago
Alternatives and similar repositories for uac-bypass-oneliners
Users that are interested in uac-bypass-oneliners are comparing it to the libraries listed below
Sorting:
- Dynamic shellcode loader with sophisticated evasion capabilities☆274Updated 2 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆250Updated last year
- Hide your P/Invoke signatures through other people's signed assemblies☆212Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆181Updated 9 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆163Updated 4 months ago
- Ghosting-AMSI☆219Updated 8 months ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆177Updated last year
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆229Updated 10 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆186Updated 8 months ago
- ☆259Updated last year
- Build sneaky & malicious LNK files.☆155Updated 5 months ago
- ☆185Updated 6 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆263Updated 8 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- A PoC for Early Cascade process injection technique.☆201Updated 10 months ago
- Windows Session Hijacking via COM☆294Updated 2 weeks ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆133Updated last year
- RunPE implementation with multiple evasive techniques☆256Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Updated 10 months ago
- A PowerShell console in C/C++ with all the security features disabled☆294Updated 2 months ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- ☆237Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- Extracting NetNTLM without touching lsass.exe☆240Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆166Updated last year
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆245Updated last week
- Python implementation of GhostPack's Seatbelt situational awareness tool☆269Updated last year
- early cascade injection PoC based on Outflanks blog post☆234Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆275Updated last year