sexyiam / UAC-Bypass
UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.
☆45Updated 8 months ago
Alternatives and similar repositories for UAC-Bypass:
Users that are interested in UAC-Bypass are comparing it to the libraries listed below
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆56Updated last year
- TypeLib persistence technique☆103Updated 3 months ago
- ☆113Updated last year
- ☆79Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆80Updated 2 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 2 months ago
- ☆122Updated 4 months ago
- ☆92Updated 4 months ago
- A newer iteration of TitanLdr with some newer hooks, and design. A generic user defined reflective DLL I built to prove a point to Mudge …☆172Updated last year
- BOF with Synthetic Stackframe☆103Updated this week
- ☆122Updated last year
- Threadless shellcode injection tool☆64Updated 5 months ago
- ☆120Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆39Updated 8 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆69Updated 3 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆89Updated 10 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆50Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆60Updated 10 months ago
- ☆150Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆65Updated 2 weeks ago
- ☆36Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 8 months ago
- ☆50Updated last month
- Lateral Movement via the .NET Profiler☆77Updated 2 months ago
- Execute dotnet app from unmanaged process☆68Updated last month