myzxcg / BypassUAC-DllView external linksLinks
Use COM Component Bypass UAC,Dll Version
☆36Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for BypassUAC-Dll
Users that are interested in BypassUAC-Dll are comparing it to the libraries listed below
Sorting:
- Indirect NT syscalls LSASS dumper.☆46Jul 9, 2023Updated 2 years ago
- EventViewer Bypass Uac Bof☆23Jul 23, 2022Updated 3 years ago
- x64 version☆36Oct 8, 2021Updated 4 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- 个人学习使用,二开DcRAT,主要是增加了功能性插件☆17Jan 26, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆96Mar 20, 2023Updated 2 years ago
- PoC arbitrary WPM without a process handle☆21Jul 22, 2023Updated 2 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- 白加黑的快速生成器(针对IAT类型)☆114Sep 19, 2022Updated 3 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Mar 22, 2022Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Misc TaskScheduler Plays☆239Sep 27, 2022Updated 3 years ago
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated 3 weeks ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆25Jul 26, 2024Updated last year
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Azure APIs enumeration and abuse☆13Dec 20, 2024Updated last year
- Bypass EDR Create TaskServers☆39Dec 24, 2022Updated 3 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆27Apr 28, 2022Updated 3 years ago
- ☆13Feb 25, 2023Updated 2 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 9 months ago
- ☆80Aug 2, 2023Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆146Aug 16, 2021Updated 4 years ago
- A BOF/COFF loader implemented in Go and CGO.☆23Jan 16, 2024Updated 2 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- ☆34Aug 7, 2023Updated 2 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆200Sep 21, 2021Updated 4 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆201Dec 27, 2023Updated 2 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 9 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- ☆10Nov 11, 2020Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- ☆41Jul 10, 2023Updated 2 years ago