catzsec / ForceAdminLinks
⚡ Create infinite UAC prompts forcing a user to run as admin ⚡
☆253Updated 2 years ago
Alternatives and similar repositories for ForceAdmin
Users that are interested in ForceAdmin are comparing it to the libraries listed below
Sorting:
- ☆331Updated 2 years ago
- 「🛡️」AVs/EDRs Evasion tool☆104Updated 9 months ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆223Updated 4 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆474Updated 3 years ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆264Updated 2 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆265Updated last year
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆276Updated 4 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆462Updated last year
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆231Updated 11 months ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆159Updated 3 years ago
- Command and Control Framework written in C#☆418Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆253Updated 2 years ago
- C# tool for UAC bypasses☆443Updated 4 years ago
- C# C2 Framework centered around Stage 1 operations☆214Updated 3 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆373Updated last year
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆425Updated 2 years ago
- A Command and Control (C2)☆307Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆444Updated 2 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆275Updated 3 years ago
- grim reaper c2☆339Updated 2 years ago
- Shellcode launcher for AV bypass☆217Updated last year
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆225Updated 3 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆392Updated 2 years ago
- XLL Phishing Tradecraft☆424Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆160Updated last year
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 3 years ago
- Process Ghosting in C#☆215Updated 3 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆110Updated 2 weeks ago
- A C2 framework for initial access in Go☆193Updated 3 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆223Updated 2 years ago