catzsec / ForceAdminLinks
⚡ Create infinite UAC prompts forcing a user to run as admin ⚡
☆253Updated 2 years ago
Alternatives and similar repositories for ForceAdmin
Users that are interested in ForceAdmin are comparing it to the libraries listed below
Sorting:
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆222Updated 3 years ago
- ☆325Updated 2 years ago
- C# tool for UAC bypasses☆433Updated 3 years ago
- Command and Control Framework written in C#☆407Updated last year
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆472Updated 3 years ago
- A Payload Loader Designed With Advanced Evasion Features☆512Updated 2 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆454Updated last year
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆465Updated 2 years ago
- grim reaper c2☆339Updated 2 years ago
- XLL Phishing Tradecraft☆423Updated 3 years ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆262Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆378Updated 10 months ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆271Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆308Updated 9 months ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆259Updated last year
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆247Updated 2 years ago
- C# Based Universal API Unhooker☆402Updated 3 years ago
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆444Updated 7 months ago
- A Command and Control (C2)☆303Updated 2 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆372Updated last year
- 「🛡️」AVs/EDRs Evasion tool☆98Updated 5 months ago
- Various Cobalt Strike BOFs☆650Updated 2 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆368Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆105Updated this week
- .NET project for installing Persistence☆477Updated 11 months ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆301Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆273Updated 3 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆438Updated 2 years ago