catzsec / ForceAdmin
⚡ Create infinite UAC prompts forcing a user to run as admin ⚡
☆249Updated 2 years ago
Alternatives and similar repositories for ForceAdmin:
Users that are interested in ForceAdmin are comparing it to the libraries listed below
- ☆322Updated last year
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆260Updated 2 years ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆412Updated last year
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆212Updated 3 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆470Updated 3 years ago
- A Payload Loader Designed With Advanced Evasion Features☆512Updated 2 years ago
- C# tool for UAC bypasses☆418Updated 3 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆374Updated 6 months ago
- 「🛡️」AVs/EDRs Evasion tool☆93Updated 2 months ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆347Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆305Updated 6 months ago
- Command and Control Framework written in C#☆392Updated last year
- A Command and Control (C2)☆298Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆255Updated last year
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆176Updated 7 months ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆445Updated 10 months ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆264Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆246Updated last year
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆424Updated last year
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆252Updated 2 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆274Updated 3 years ago
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆432Updated 3 months ago
- Payload Loader With Evasion Features☆314Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆459Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆515Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆153Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆412Updated last year
- Go shellcode loader that combines multiple evasion techniques☆361Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆492Updated last year
- XLL Phishing Tradecraft☆408Updated 2 years ago