exploitblizzard / Love.exe
Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s
☆15Updated 2 years ago
Related projects: ⓘ
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆41Updated 2 years ago
- ☆12Updated this week
- ☆12Updated this week
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆14Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 3 years ago
- A very weird RAT☆19Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- ☆19Updated this week
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆2Updated last year
- ☆12Updated this week
- Obfuscator for batch script☆57Updated 3 weeks ago
- ☆12Updated this week
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- ☆27Updated this week
- 💻 Windows 10 Kernel-mode rootkit☆30Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Injecting shellcode into a process memory and executing it in C#☆49Updated last year
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- ☆23Updated 7 months ago
- Simple keylogger written in C# which is ready for modifications.☆12Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆9Updated 3 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆39Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆28Updated 2 years ago
- ☆11Updated this week
- Download payload to disk and install it to startup then melt.☆36Updated 5 years ago
- ☆14Updated this week
- ☆11Updated this week