rootm0s / UUB
UIAccess UAC Bypass using token duplication and keyboard events
☆25Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for UUB
- ☆11Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆37Updated 3 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆13Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 5 years ago
- A repo to hold any bypasses I work on/study/whatever☆18Updated 3 years ago
- ☆31Updated 4 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 4 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 4 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆22Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- Execute Shellcode And Other Goodies From MMC☆12Updated 9 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 4 years ago
- ☆41Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆29Updated 4 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆13Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆33Updated 3 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆40Updated last year