hfiref0x / UACME
Defeating Windows User Account Control
☆6,763Updated 2 months ago
Alternatives and similar repositories for UACME
Users that are interested in UACME are comparing it to the libraries listed below
Sorting:
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆3,948Updated 6 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,612Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,065Updated 2 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,379Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,528Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,329Updated 4 years ago
- Windows Exploit Suggester - Next Generation☆4,435Updated this week
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,932Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,828Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,670Updated 4 years ago
- PowerShell Obfuscator☆3,969Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,540Updated 7 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,811Updated 2 months ago
- ☆3,585Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,194Updated last year
- Trying to tame the three-headed dog.☆4,439Updated last month
- UAC bypass, Elevate, Persistence methods☆2,680Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,087Updated 4 months ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,915Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,312Updated last month
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,397Updated 10 months ago
- Converts PE into a shellcode☆2,537Updated last year
- A swiss army knife for pentesting networks☆8,725Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,270Updated this week
- windows-kernel-exploits Windows平台提权漏洞集合☆8,308Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,443Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,566Updated 3 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,574Updated 3 weeks ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,314Updated 3 weeks ago
- Mimikatz implementation in pure Python☆3,023Updated this week