Use COM Component Bypass UAC,Dll Version
☆36Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for BypassUAC-Dll
Users that are interested in BypassUAC-Dll are comparing it to the libraries listed below
Sorting:
- Indirect NT syscalls LSASS dumper.☆47Jul 9, 2023Updated 2 years ago
- EventViewer Bypass Uac Bof☆23Jul 23, 2022Updated 3 years ago
- x64 version☆36Oct 8, 2021Updated 4 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- 个人学习使用,二开DcRAT,主要是增加了功能性插件☆17Jan 26, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆97Mar 20, 2023Updated 2 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- 白加黑的快速生成器(针对IAT类型)☆115Sep 19, 2022Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Mar 22, 2022Updated 3 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Misc TaskScheduler Plays☆238Sep 27, 2022Updated 3 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated last month
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆25Jul 26, 2024Updated last year
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Azure APIs enumeration and abuse☆12Feb 26, 2026Updated last week
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Bypass EDR Create TaskServers☆39Dec 24, 2022Updated 3 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆27Apr 28, 2022Updated 3 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- ☆13Feb 25, 2023Updated 3 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆146Aug 16, 2021Updated 4 years ago
- A BOF/COFF loader implemented in Go and CGO.☆23Jan 16, 2024Updated 2 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- ☆34Aug 7, 2023Updated 2 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆204Dec 27, 2023Updated 2 years ago
- ☆10Nov 11, 2020Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- ☆41Jul 10, 2023Updated 2 years ago