Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
☆118Feb 12, 2026Updated last month
Alternatives and similar repositories for ForceAdmin
Users that are interested in ForceAdmin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆81Nov 13, 2024Updated last year
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- Reverse engineering malware samples☆16Dec 3, 2021Updated 4 years ago
- Most advanced and poorly coded windows batch obfuscator ever made (aka the best)☆353Dec 1, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆19Updated this week
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 7 months ago
- ☆10Jan 17, 2022Updated 4 years ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 11 months ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆22Nov 3, 2024Updated last year
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆87Sep 27, 2025Updated 6 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Tool to dump cisco device configs via snmp and/or add new users☆13Mar 27, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆37Nov 8, 2024Updated last year
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 10 months ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆112Apr 12, 2020Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- DarkRat source - beware untested source and resources.☆22Dec 7, 2019Updated 6 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆15Apr 8, 2024Updated 2 years ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Sep 3, 2020Updated 5 years ago
- A simple powershell script to log your ip address☆73Mar 22, 2026Updated 2 weeks ago
- ☆143May 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- ☆24Nov 28, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- DorkStorm is the perfect tool for discovering hidden information on the internet.☆14Feb 23, 2024Updated 2 years ago
- ☆23Mar 24, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cronos Crypter is an simple example of crypter created for educational purposes.☆104Sep 19, 2024Updated last year
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 11 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Spoof the return address of any function call.☆11Jul 21, 2024Updated last year
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 7 months ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago