sexyiam / UAC-Bypass
UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.
☆44Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for UAC-Bypass
- TypeLib persistence technique☆75Updated 3 weeks ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆19Updated 2 weeks ago
- ☆87Updated 2 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆78Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆88Updated 9 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆75Updated last year
- ☆76Updated last year
- ☆108Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆37Updated 6 months ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆113Updated last year
- A collection of (even more) alternative shellcode callback methods in CSharp☆67Updated 3 weeks ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆49Updated 2 years ago
- A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.☆70Updated 4 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆72Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆85Updated 8 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆36Updated 11 months ago
- ☆118Updated last year
- ☆116Updated 2 months ago
- Rewrite to fit my needs☆26Updated 4 months ago
- ☆119Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆55Updated 3 months ago
- ☆122Updated 11 months ago
- ApexLdr is a DLL Payload Loader written in C☆105Updated 4 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆148Updated 10 months ago
- Threadless shellcode injection tool☆60Updated 3 months ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆59Updated last month
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆57Updated 8 months ago
- Tool for playing with Windows Access Token manipulation.☆52Updated last year
- ☆146Updated last year