cybersectroll / TrollUAC
☆137Updated 11 months ago
Alternatives and similar repositories for TrollUAC
Users that are interested in TrollUAC are comparing it to the libraries listed below
Sorting:
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated last month
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆94Updated last week
- ☆87Updated last year
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆91Updated 6 months ago
- ☆184Updated last year
- Tool for viewing NTDS.dit☆163Updated 2 months ago
- ☆155Updated 9 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- ☆154Updated 5 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆117Updated 8 months ago
- ☆179Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆89Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆140Updated last month
- ☆121Updated last week
- Stage 0☆159Updated 5 months ago
- Find DLLs with RWX section☆80Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆161Updated 2 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆180Updated last year
- Spoofing desktop login applications with WinForms and WPF☆173Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆121Updated 7 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆237Updated last month
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated last year
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆112Updated 4 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆129Updated 3 weeks ago
- ☆174Updated 6 months ago
- A Mythic Agent written in PIC C.☆189Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- ☆128Updated 3 months ago