UIAccess UAC Bypass using token duplication and keyboard events
☆27Sep 26, 2019Updated 6 years ago
Alternatives and similar repositories for UUB
Users that are interested in UUB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆39Jul 9, 2019Updated 6 years ago
- 蜜罐捕获的数据☆12May 16, 2016Updated 10 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A better alternative to RunDLL32☆35Jun 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆26Sep 2, 2025Updated 8 months ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆16May 8, 2019Updated 7 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆16Jun 5, 2023Updated 2 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 7 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆30Jun 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 11 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Jun 6, 2023Updated 2 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 4 months ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆43Oct 30, 2019Updated 6 years ago
- ☆24May 24, 2022Updated 3 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Just pick out the code we need.☆66Nov 22, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Feb 22, 2019Updated 7 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 8 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 7 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Passwords Recovery Tool☆234Feb 3, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Zimbra邮件系统漏洞 XXE/RCE/SSRF/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)☆79Feb 22, 2023Updated 3 years ago
- Dll injection for executable file☆17Jul 22, 2016Updated 9 years ago
- Industrial Hacking Simulator☆27Feb 21, 2026Updated 3 months ago
- I created the python script to bypass UAC to get system shell .☆122Sep 2, 2019Updated 6 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆110Aug 21, 2018Updated 7 years ago
- with metasploit☆63Apr 19, 2020Updated 6 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago