cybersectroll / TrollUACLinks
☆144Updated last year
Alternatives and similar repositories for TrollUAC
Users that are interested in TrollUAC are comparing it to the libraries listed below
Sorting:
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- ☆155Updated 5 months ago
- Weaponized HellsGate/SigFlip☆199Updated 2 years ago
- ☆90Updated last year
- ☆166Updated 10 months ago
- ☆130Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆161Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆183Updated 4 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆102Updated 3 weeks ago
- Construct the payload at runtime using an array of offsets☆63Updated 11 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆92Updated 7 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆144Updated 5 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆153Updated last year
- Sleep obfuscation☆224Updated 5 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆242Updated 2 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 11 months ago
- Extracting NetNTLM without touching lsass.exe☆236Updated last year
- ☆151Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆181Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆172Updated last year
- Bypass LSA protection using the BYODLL technique☆161Updated 8 months ago
- BOF with Synthetic Stackframe☆147Updated 3 months ago
- ☆176Updated last week
- ☆141Updated 7 months ago
- ☆185Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆215Updated 9 months ago
- A Mythic Agent written in PIC C.☆188Updated 4 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆200Updated 11 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year