Abusing autoElevate - Fully Undetectable UAC Bypass exploit
☆11Jul 15, 2022Updated 3 years ago
Alternatives and similar repositories for iSCSI-UAC-Bypass
Users that are interested in iSCSI-UAC-Bypass are comparing it to the libraries listed below
Sorting:
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆52Feb 21, 2022Updated 4 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Nov 17, 2021Updated 4 years ago
- An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.☆15Dec 14, 2023Updated 2 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Dec 26, 2021Updated 4 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- 2024 - CANCELED AT REQUEST OF SAMSUNG. This Magisk Module was going to attempt to add missing engineering/combination framework to the de…☆11Jul 18, 2024Updated last year
- golang uuid-shellcode加载器,分离执行,可直接把shellcode写入程序。☆15Aug 12, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Nov 10, 2021Updated 4 years ago
- uuid-shellcode-execution☆13May 9, 2021Updated 4 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 4 months ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Recently got a Galaxy S10 for work, using this to debloat.☆10Sep 15, 2022Updated 3 years ago
- Nethunter kernel for exynos9820 and 9825 devices. current support is only enabled for d2s.☆14Sep 26, 2021Updated 4 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆34Mar 22, 2022Updated 3 years ago
- Shellcode encryption in RC4 and process injection into explorer.exe.☆36May 4, 2023Updated 2 years ago
- A stealth SSH backdoor leveraging PAM shared object (.so) injection to bypass authentication and gain SSH access.☆15Mar 7, 2025Updated last year
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multipl…☆13May 8, 2022Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Azure APIs enumeration and abuse☆12Feb 26, 2026Updated 3 weeks ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- ☆50Sep 19, 2025Updated 6 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago