oxfemale / uac
UAC bypass and Elevate
☆13Updated 8 years ago
Alternatives and similar repositories for uac:
Users that are interested in uac are comparing it to the libraries listed below
- ☆8Updated 11 years ago
- C++ Code Injector Class☆21Updated 4 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Updated 7 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Bootkit for Windows 7☆28Updated 10 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- User-mode hook bypassing method☆33Updated 8 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- POC runtime crypter☆9Updated 6 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 9 years ago
- ☆12Updated 8 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- A simple rootkit to hide a process☆46Updated 11 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆56Updated 5 years ago
- Simple RAT (only on own network) made in C++☆16Updated 12 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆52Updated last year
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 13 years ago
- ☆12Updated 8 years ago
- Passive UAC elevation using dll infection☆73Updated 10 years ago
- Power Loader botnet☆39Updated 10 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆41Updated 6 months ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆14Updated 5 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆23Updated 10 years ago