Abusing autoElevate - Fully Undetectable UAC Bypass exploit
☆11Jul 15, 2022Updated 3 years ago
Alternatives and similar repositories for iSCSI-UAC-Bypass
Users that are interested in iSCSI-UAC-Bypass are comparing it to the libraries listed below
Sorting:
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Nov 17, 2021Updated 4 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆52Feb 21, 2022Updated 4 years ago
- An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.☆15Dec 14, 2023Updated 2 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Dec 26, 2021Updated 4 years ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆28Aug 18, 2025Updated 6 months ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自 定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Mar 22, 2022Updated 3 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Nov 10, 2021Updated 4 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- Shellcode encryption in RC4 and process injection into explorer.exe.☆36May 4, 2023Updated 2 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- ☆37May 8, 2022Updated 3 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- 2024 - CANCELED AT REQUEST OF SAMSUNG. This Magisk Module was going to attempt to add missing engineering/combination framework to the de…☆11Jul 18, 2024Updated last year
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Nethunter kernel for exynos9820 and 9825 devices. current support is only enabled for d2s.☆14Sep 26, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A collection of utility scripts and other tools that make working with Crabgrass easier.☆11Apr 3, 2020Updated 5 years ago
- Azure APIs enumeration and abuse☆13Updated this week
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- Reply to hot /r/NFTsMarketplace airdrop posts with your wallet address☆11Aug 27, 2023Updated 2 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆47Jan 21, 2026Updated last month
- ✨ Lumberjack is a minimal, configurable Console with utilities.☆16Jun 16, 2024Updated last year
- ☆12Sep 22, 2025Updated 5 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- Encrypt your content and share it via a web page☆10Oct 24, 2023Updated 2 years ago
- Deep Learning (PyTorch) Models Deployment using SQL databases☆10Jul 25, 2021Updated 4 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago