blue0x1 / uac-bypass-oneliners
Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applications to elevate privileges.
☆92Updated last week
Alternatives and similar repositories for uac-bypass-oneliners:
Users that are interested in uac-bypass-oneliners are comparing it to the libraries listed below
- Just another C2 Redirector using CloudFlare.☆82Updated 8 months ago
- ☆120Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆84Updated 7 months ago
- ☆136Updated 5 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆53Updated 6 months ago
- Sleep obfuscation☆199Updated last month
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆96Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 10 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 9 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆157Updated last month
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- Create Anti-Copy DRM Malware☆50Updated 4 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- Recursive Loader☆102Updated 3 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆68Updated 5 months ago
- .bin file to shellcode convertor☆31Updated 6 months ago
- ☆146Updated last year
- ☆180Updated last year
- ☆121Updated 4 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- A Mythic Agent written in PIC C.☆167Updated last week
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆69Updated 3 weeks ago
- A set of programs for analyzing common vulnerabilities in COM☆165Updated 4 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆215Updated 4 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆151Updated 3 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 6 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆179Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆194Updated 7 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 6 months ago