hackerhouse-opensource / MsSettingsDelegateExecuteLinks
Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.
☆77Updated 2 years ago
Alternatives and similar repositories for MsSettingsDelegateExecute
Users that are interested in MsSettingsDelegateExecute are comparing it to the libraries listed below
Sorting:
- RDLL for Cobalt Strike beacon to silence sysmon process☆88Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 5 months ago
- Identify and exploit leaked handles for local privilege escalation.☆108Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆100Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- ☆88Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆54Updated 3 years ago
- Windows internals and exploitation tricks☆95Updated 6 months ago
- A PoC for achieving persistence via push notifications on Windows☆46Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- Various methods of executing shellcode☆70Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆72Updated 2 months ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆55Updated 2 years ago
- Do some DLL SideLoading magic☆83Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 3 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Updated 2 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆108Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆103Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- API Hammering with C++20☆47Updated 2 years ago