sexyiam / UAC-Bypass
UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.
☆46Updated 9 months ago
Alternatives and similar repositories for UAC-Bypass:
Users that are interested in UAC-Bypass are comparing it to the libraries listed below
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆58Updated last year
- TypeLib persistence technique☆108Updated 4 months ago
- ☆93Updated 6 months ago
- ☆115Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆23Updated 4 months ago
- Threadless shellcode injection tool☆63Updated 7 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 10 months ago
- ☆123Updated 6 months ago
- A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.☆73Updated 4 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆147Updated last year
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆82Updated 4 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- A collection of (even more) alternative shellcode callback methods in CSharp☆69Updated 4 months ago
- ☆120Updated last year
- ☆78Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- Bypassing Amsi using LdrLoadDll☆38Updated last month
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- EmbedExeLnk by x86matthew modified by d4rkiZ☆34Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- Shellcode loader☆76Updated 3 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆78Updated last month
- Execute dotnet app from unmanaged process☆70Updated 2 months ago
- BOF with Synthetic Stackframe☆135Updated last week
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated 10 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆59Updated 11 months ago