rootm0s / UUB
UIAccess UAC Bypass using token duplication and keyboard events
☆27Updated 5 years ago
Alternatives and similar repositories for UUB:
Users that are interested in UUB are comparing it to the libraries listed below
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- ☆35Updated 5 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆22Updated 6 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Non organized Cpp code files I used for my research on Windows☆18Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1☆19Updated 2 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- ☆31Updated 4 years ago
- ☆11Updated 5 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- ☆12Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Synaptics Audio Driver LPE☆37Updated 5 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago