myzxcg / BypassUAC-Dll
Use COM Component Bypass UAC,Dll Version
☆33Updated 3 years ago
Alternatives and similar repositories for BypassUAC-Dll:
Users that are interested in BypassUAC-Dll are comparing it to the libraries listed below
- Load shellcode via syscall☆47Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆43Updated 2 years ago
- ☆40Updated last year
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- ☆26Updated last year
- use aswArPot.sys to kill process☆67Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆54Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- Re-implement cmd.exe using windows api☆48Updated 2 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- ☆19Updated 2 years ago
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆65Updated 2 years ago
- UAC_wenpon☆48Updated 3 years ago
- ShellCodeLoader via DInvoke☆55Updated 3 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆31Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆45Updated 2 years ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆19Updated 2 years ago
- ☆31Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆21Updated 9 months ago
- A simple hidden vnc.☆32Updated 4 years ago
- 白文件扫描器 非公开☆26Updated 3 years ago
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆32Updated 3 years ago
- ☆40Updated last year
- dump lsass tool☆39Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- ☆32Updated 4 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated 2 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆12Updated last year