cybersectroll / TrollUACLinks
☆146Updated last year
Alternatives and similar repositories for TrollUAC
Users that are interested in TrollUAC are comparing it to the libraries listed below
Sorting:
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆187Updated 7 months ago
- ☆90Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Good CLR Host with Native patchless AMSI Bypass☆88Updated 4 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- A Mythic agent for Windows written in C☆134Updated last week
- Bypass LSA protection using the BYODLL technique☆168Updated 11 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆119Updated 9 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆125Updated 11 months ago
- ☆135Updated 7 months ago
- Spoofing desktop login applications with WinForms and WPF☆176Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆114Updated 2 months ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆95Updated 10 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆93Updated 2 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆155Updated last month
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆132Updated 4 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 9 months ago
- Stage 0☆164Updated 8 months ago
- Chrome browser extension-based Command & Control☆170Updated 2 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆160Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆102Updated 5 months ago
- ☆157Updated 9 months ago
- ☆119Updated 7 months ago
- ☆109Updated 7 months ago
- Indirect Syscall with TartarusGate Approach in Go☆132Updated 2 months ago