k4sth4 / UAC-bypassLinks
Windows Privilege Escalation
☆100Updated last year
Alternatives and similar repositories for UAC-bypass
Users that are interested in UAC-bypass are comparing it to the libraries listed below
Sorting:
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆282Updated 3 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- 🍊 Orange Tsai EventViewer RCE☆193Updated 3 years ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆315Updated 3 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- Amsi Bypass payload that works on Windwos 11☆376Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆142Updated 2 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆390Updated last year
- Attempt at Obfuscated version of SharpCollection☆237Updated last month
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆205Updated last year
- AV Evasion Techniques☆82Updated 3 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆314Updated last month
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆79Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆522Updated last month
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆257Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆171Updated 2 weeks ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆350Updated last year
- transform your payload into ipv4/ipv6/mac arrays☆237Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆350Updated 2 years ago
- ☆171Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆133Updated 4 years ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆191Updated last year
- A windows token impersonation tool☆319Updated 2 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆148Updated 11 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆138Updated 9 months ago
- Awesome AV/EDR/XDR Bypass Tips☆285Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- Patching AmsiOpenSession by forcing an error branching☆153Updated 2 years ago
- ☆259Updated last year