sexyiam / UAC-BypassView external linksLinks
UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.
☆52May 8, 2024Updated last year
Alternatives and similar repositories for UAC-Bypass
Users that are interested in UAC-Bypass are comparing it to the libraries listed below
Sorting:
- ☆186Jun 14, 2025Updated 8 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆63Jan 13, 2026Updated last month
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆249Jun 11, 2024Updated last year
- ☆341Nov 10, 2025Updated 3 months ago
- ☆242May 5, 2024Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆258Jun 29, 2024Updated last year
- Powershell and python utilties for Entra Connect☆27Jun 5, 2025Updated 8 months ago
- XOR decrypting shellcode using the GPU with OpenCL.☆120May 22, 2025Updated 8 months ago
- A C# Solution Source Obfuscator for avoiding AV signatures with minimal user interaction. Powered by the Roslyn C# library.☆99Mar 25, 2025Updated 10 months ago
- ☆102Sep 5, 2023Updated 2 years ago
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆165Sep 22, 2025Updated 4 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- ☆64May 31, 2024Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆254Jun 6, 2024Updated last year
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆332Mar 6, 2025Updated 11 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Mar 19, 2023Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆366Apr 19, 2023Updated 2 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆154Jan 7, 2025Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 6 months ago
- Cobalt Strike BOF☆42Dec 10, 2025Updated 2 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆167May 30, 2024Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆359Jan 29, 2026Updated 2 weeks ago
- ☆151Oct 2, 2023Updated 2 years ago
- ☆248Jul 31, 2024Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆28Jan 22, 2025Updated last year
- ☆160Mar 27, 2023Updated 2 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆282Jun 18, 2025Updated 7 months ago
- Your syscall factory☆126Jan 13, 2026Updated last month
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- A Simple PoC☆22May 24, 2024Updated last year
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago