gushmazuko / WinBypass
Windows UAC Bypass
☆98Updated 6 years ago
Alternatives and similar repositories for WinBypass:
Users that are interested in WinBypass are comparing it to the libraries listed below
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆245Updated 4 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆174Updated 4 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆264Updated 5 years ago
- Shellcoding utilities☆222Updated 4 years ago
- I created the python script to bypass UAC to get system shell .☆122Updated 5 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 3 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆140Updated 4 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆74Updated 6 years ago
- Example DLL to load from Windows NetShell☆179Updated 8 years ago
- ☆42Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- Create a minidump of the LSASS process from memory☆260Updated 2 years ago
- Python api for usage with cobalt strike's External C2 specification☆235Updated 2 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- DLL Generator for side loading attack☆171Updated 6 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆115Updated 5 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 2 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- with metasploit☆63Updated 5 years ago
- Poc for CVE-2019-1253☆156Updated 3 years ago
- A tool to create obfuscated HTA script.☆177Updated 3 years ago
- How To Execute Shellcode via HTA☆137Updated 7 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆204Updated 7 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆113Updated 8 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆257Updated 6 years ago
- POC for Cobalt Strike external C2☆133Updated 3 years ago