cybersectroll / TrollUACLinks
☆146Updated last year
Alternatives and similar repositories for TrollUAC
Users that are interested in TrollUAC are comparing it to the libraries listed below
Sorting:
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- ☆90Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- ☆133Updated 6 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 10 months ago
- A BOF to enumerate system process, their protection levels, and more.☆119Updated 9 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- Indirect Syscall with TartarusGate Approach in Go☆128Updated last month
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆139Updated 3 weeks ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆187Updated 6 months ago
- ☆152Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Good CLR Host with Native patchless AMSI Bypass☆87Updated 4 months ago
- ☆110Updated 6 months ago
- Abuse leaked token handles.☆132Updated last year
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆95Updated 10 months ago
- .bin file to shellcode convertor☆38Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year
- ☆82Updated last year
- Stage 0☆163Updated 8 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆162Updated last year
- ☆124Updated 11 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆132Updated 4 months ago
- Spoofing desktop login applications with WinForms and WPF☆176Updated last year
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated 2 years ago