isPique / Fuck-Windows-Security
A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a powershell script and as an executable (.exe) file.)
☆34Updated 3 weeks ago
Alternatives and similar repositories for Fuck-Windows-Security:
Users that are interested in Fuck-Windows-Security are comparing it to the libraries listed below
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- LNK-Dropper Builder☆22Updated 3 weeks ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆41Updated this week
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆101Updated last week
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 11 months ago
- Simple Powershell Http shell With WEB UI☆70Updated 3 weeks ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆69Updated last year
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆71Updated 5 months ago
- execute PE in memory Filelessly☆34Updated 2 months ago
- Lime Crypter Obfuscator Mod☆28Updated 9 months ago
- It was a great run, but everything must come to an end. Please don’t contact me. Before I go, here’s a final gift :)☆26Updated this week
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆47Updated 11 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆69Updated 3 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆52Updated last year
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆54Updated last year
- shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually fro…☆9Updated this week
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated this week
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated this week
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆105Updated 3 months ago
- The best powershell obfuscator ever made☆103Updated last week
- ☆31Updated 7 months ago
- User Mode Windows Rootkit☆59Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆208Updated 10 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆29Updated 2 years ago
- ☆12Updated 11 months ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆41Updated last month
- A command and control framework.☆50Updated 4 months ago