moom825 / EventViewer-Unsafe-Deserialization-UACBypassView external linksLinks
A uacbypass that works on medium IL that abuses EventViewers unsafe deserialization to RecentViews
☆15Aug 29, 2023Updated 2 years ago
Alternatives and similar repositories for EventViewer-Unsafe-Deserialization-UACBypass
Users that are interested in EventViewer-Unsafe-Deserialization-UACBypass are comparing it to the libraries listed below
Sorting:
- ☆12Aug 30, 2024Updated last year
- ☆52Sep 26, 2024Updated last year
- C# Codedom example / builder☆24Mar 8, 2020Updated 5 years ago
- Download a .NET payload and run it on memory☆70Apr 12, 2019Updated 6 years ago
- A simple Botnet. 一个简单的僵尸网络Bot。☆21Dec 30, 2020Updated 5 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- Counter-Strike 2向けのシンプルな外部チート☆15Dec 2, 2025Updated 2 months ago
- Fud Runpe Av Evasion / All Av Bypass☆32Feb 24, 2023Updated 2 years ago
- ☆11May 17, 2023Updated 2 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- A comprehensive Delphi implementation of reverse SSH tunneling with integrated SOCKS5 proxy capabilities, enabling secure remote access t…☆15Dec 22, 2024Updated last year
- ☆10May 28, 2020Updated 5 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- ☆15Feb 18, 2022Updated 3 years ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- ☆12May 28, 2020Updated 5 years ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆12Jan 4, 2026Updated last month
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- Standalone Java implementation of the RFC-9285 Base45 Standard.☆13Jul 14, 2023Updated 2 years ago
- Proof of Concept Chatbot☆10Jan 13, 2023Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- ☆11Aug 25, 2023Updated 2 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 10 months ago
- Unbounded cache model for online language modeling with open vocabulary☆11Feb 15, 2019Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20May 17, 2023Updated 2 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated last week
- This Android Demo Example Shows the Hirji(Islamic) and Gregorian Calendar. Developer can Customize the Calendar by import the Calendar …☆10Nov 11, 2019Updated 6 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆14Jan 6, 2026Updated last month
- Hurricane - The best .NET Patcher & Analyzer. Made by Cabbo.☆37Apr 7, 2023Updated 2 years ago
- License Key Generator and Validation written in C# .NET☆12Feb 28, 2023Updated 2 years ago
- PoC that downloads an executable from public DNS servers☆20Jul 19, 2025Updated 6 months ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- ☆13Sep 8, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year