Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC bypass. Win 7 & up.
☆143Feb 2, 2026Updated last month
Alternatives and similar repositories for ColorDataProxyUACBypass
Users that are interested in ColorDataProxyUACBypass are comparing it to the libraries listed below
Sorting:
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- ☆132Oct 14, 2022Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11☆833Feb 2, 2026Updated last month
- UAC bypass by abusing RPC and debug objects.☆628Oct 19, 2023Updated 2 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated last month
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated last month
- UAC bypass for x64 Windows 7 - 11(无弹窗版)☆281Sep 5, 2022Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Sep 15, 2022Updated 3 years ago
- A BOF to determine Windows Defender exclusions.☆253Jun 25, 2023Updated 2 years ago
- 微信PC版数据库解密工具 .NET版本☆138Sep 1, 2022Updated 3 years ago
- Misc TaskScheduler Plays☆238Sep 27, 2022Updated 3 years ago
- Take a screenshot without injection for Cobalt Strike☆203Jun 7, 2023Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- A shellcode function to encrypt a running process image when sleeping.☆339Sep 11, 2021Updated 4 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆402Feb 6, 2023Updated 3 years ago
- In-memory token vault BOF for Cobalt Strike☆149Aug 18, 2022Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆174Jan 17, 2024Updated 2 years ago
- ☆144May 17, 2023Updated 2 years ago
- Stop Windows Defender programmatically☆15Jan 17, 2022Updated 4 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- PrintNotifyPotato☆539Dec 2, 2022Updated 3 years ago
- UDRL for CS☆443Dec 3, 2023Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆146Aug 16, 2021Updated 4 years ago
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆372Dec 9, 2022Updated 3 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated last month
- 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密☆368Sep 8, 2022Updated 3 years ago
- Bypassing UAC with SSPI Datagram Contexts☆465Sep 24, 2023Updated 2 years ago
- ☆706Nov 7, 2023Updated 2 years ago
- dump lsass进程工具☆561Jul 20, 2023Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆945Nov 12, 2022Updated 3 years ago
- load assembly executable file in memory☆41Aug 11, 2023Updated 2 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆279Aug 4, 2021Updated 4 years ago
- An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memor…☆492Dec 7, 2025Updated 3 months ago
- ☆184Jul 2, 2022Updated 3 years ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆300Mar 1, 2023Updated 3 years ago