oxfemale / uac
UAC bypass and Elevate
☆12Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for uac
- Kernel (Ring0) - SSDT unhook driver☆13Updated 6 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 10 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆17Updated 7 years ago
- (This is a fork used primarily to submit patches into upstream repository) RpcView is a free tool to explore and decompile Microsoft RPC …☆18Updated last year
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- Bootkit for Windows 7☆26Updated 10 years ago
- ☆12Updated 7 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆30Updated 5 years ago
- C++ Code Injector Class☆21Updated 4 years ago
- Power Loader botnet☆39Updated 9 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆73Updated 6 years ago
- find and kill injectedThreads from memory☆10Updated 8 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆36Updated 7 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆24Updated 6 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆31Updated 6 years ago
- ☆8Updated 11 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆15Updated 6 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago
- Helper utility for debugging windows PE/PE+ loader.☆50Updated 9 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 9 years ago
- Small class to help perform syscalls.☆21Updated last year
- win32/x64 obfuscate framework☆32Updated 5 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆54Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 4 years ago
- fork HoShiMin Avanguard☆19Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago