Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming and performance PC's. A UAC elevation vulnerability exists that can be used for persistence in a novel fashion.
☆34Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for Gigabyte_ElevatePersist
Users that are interested in Gigabyte_ElevatePersist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 2 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated 2 months ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 2 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆143Feb 2, 2026Updated 2 months ago
- Winsocket for Cobalt Strike.☆105Jul 6, 2023Updated 2 years ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated 2 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Jan 12, 2023Updated 3 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 2 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆125Feb 13, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 2 months ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- SolarView Compact through 6.00 downloader.php commands injection (RCE) nuclei-templates☆15Jun 16, 2023Updated 2 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- Inline syscalls made for MSVC supporting x64 and WOW64☆194Jul 10, 2023Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆79Aug 2, 2023Updated 2 years ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆146Apr 21, 2022Updated 3 years ago
- Take a screenshot without injection for Cobalt Strike☆205Jun 7, 2023Updated 2 years ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- Simple BOF to read the protection level of a process☆119May 10, 2023Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- Weaponized HellsGate/SigFlip☆207Jun 7, 2023Updated 2 years ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆395Jan 9, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆61Aug 21, 2023Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated 2 months ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated 2 months ago