hfiref0x / UACMELinks
Defeating Windows User Account Control
☆6,779Updated 2 months ago
Alternatives and similar repositories for UACME
Users that are interested in UACME are comparing it to the libraries listed below
Sorting:
- PowerShell Obfuscator☆3,992Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,072Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆3,985Updated 7 months ago
- UAC bypass, Elevate, Persistence methods☆2,685Updated 2 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,232Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,621Updated 5 years ago
- Windows Exploit Suggester - Next Generation☆4,469Updated last week
- Linux privilege escalation auditing tool☆5,972Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,376Updated 4 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,618Updated this week
- Privilege Escalation Project - Windows / Linux / Mac☆2,545Updated 8 months ago
- A swiss army knife for pentesting networks☆8,746Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,609Updated this week
- Trying to tame the three-headed dog.☆4,479Updated last month
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,107Updated 4 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,419Updated 10 months ago
- Privilege Escalation Enumeration Script for Windows☆3,308Updated 3 weeks ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,337Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,334Updated last week
- Mimikatz implementation in pure Python☆3,038Updated last week
- Red Teaming Tactics and Techniques☆4,271Updated 9 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,848Updated 2 weeks ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,579Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,493Updated 6 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,869Updated 6 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,835Updated last year
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆2,950Updated 2 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,383Updated last year
- netshell features all in version 2 powershell☆2,249Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆14,375Updated this week