Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
☆118Feb 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for ForceAdmin
Users that are interested in ForceAdmin are comparing it to the libraries listed below
Sorting:
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆80Nov 13, 2024Updated last year
- ☆10Jan 17, 2022Updated 4 years ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Reverse engineering malware samples☆16Dec 3, 2021Updated 4 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Aug 10, 2020Updated 5 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 8 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Apr 12, 2020Updated 5 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Polymorph file protector☆43Jun 12, 2019Updated 6 years ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆20Feb 16, 2021Updated 5 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- The first open source runtime windows batch and command line deobfuscator☆42Aug 20, 2025Updated 6 months ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Feb 24, 2023Updated 3 years ago
- Most advanced and poorly coded windows batch obfuscator ever made (aka the best)☆348Dec 1, 2025Updated 2 months ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆104Sep 19, 2024Updated last year
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆84Sep 27, 2025Updated 5 months ago
- .NET project for installing Persistence☆63Feb 14, 2022Updated 4 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆167Apr 22, 2022Updated 3 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆66Feb 11, 2018Updated 8 years ago
- A simple powershell script to log your ip address☆68Feb 2, 2026Updated 3 weeks ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- ☆16Jan 12, 2022Updated 4 years ago