eladshamir / SharpElevator
SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and published in his brilliant post at: https://googleprojectzero.blogspot.com/2019/12/calling-local-windows-rpc-servers-from.html
☆51Updated 2 years ago
Alternatives and similar repositories for SharpElevator:
Users that are interested in SharpElevator are comparing it to the libraries listed below
- Beacon Object File allowing creation of Beacons in different sessions.☆78Updated 2 years ago
- A simple BOF that frees UDRLs☆115Updated 2 years ago
- ☆138Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Cobalt Strike BOF for quser.exe implementation using Windows API☆83Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated last year
- ☆78Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆31Updated last year
- C# Port of LdapRelayScan☆79Updated 2 years ago
- Click Once + App Domain☆62Updated last year
- Beacon Object Files (not Buffer Overflows)☆53Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆81Updated 3 years ago
- A care package of useful bofs for red team engagments☆54Updated 2 months ago
- ☆97Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 9 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆46Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆63Updated 4 months ago
- ☆123Updated last year
- ProcExp Driver (Ab)use☆20Updated 2 years ago
- Halos Gate-based NTAPI Unhooker☆50Updated 2 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆24Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆74Updated last month
- ☆127Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- Execute dotnet app from unmanaged process☆70Updated last month
- BypassCredGuard CS BOF☆32Updated 3 weeks ago