cybersectroll / TrollUACLinks
☆144Updated last year
Alternatives and similar repositories for TrollUAC
Users that are interested in TrollUAC are comparing it to the libraries listed below
Sorting:
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- ☆135Updated 7 months ago
- Spoofing desktop login applications with WinForms and WPF☆176Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆92Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 6 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆102Updated 11 months ago
- ☆91Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆161Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆134Updated 5 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆190Updated 8 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆164Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- Indirect Syscall with TartarusGate Approach in Go☆133Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 10 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆155Updated 2 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆146Updated last year
- Create Anti-Copy DRM Malware☆66Updated last year
- ☆122Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆114Updated 2 months ago
- ☆192Updated 6 months ago
- Bypass LSA protection using the BYODLL technique☆168Updated last year
- ☆158Updated 9 months ago
- Build sneaky & malicious LNK files.☆146Updated 2 months ago
- A Mythic agent for Windows written in C☆136Updated 3 weeks ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Good CLR Host with Native patchless AMSI Bypass☆91Updated 5 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆255Updated 5 months ago
- Stage 0☆164Updated 9 months ago