w4fz5uck5 / LonelyALPC-BypassUAC
Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]
☆31Updated last year
Related projects ⓘ
Alternatives and complementary repositories for LonelyALPC-BypassUAC
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆27Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 4 years ago
- A simple COM server which provides a component to run shellcode☆132Updated 4 years ago
- ☆49Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆74Updated 3 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆33Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆40Updated last year
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆63Updated 4 years ago
- C++ implant that interfaces with a SK8PARK server☆47Updated 3 years ago
- Initial Commit of Coresploit☆55Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆39Updated 3 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆23Updated 5 years ago
- LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.☆113Updated 4 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆73Updated 4 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 3 years ago
- Source code for HppDLL - local password dumping using MsvpPasswordValidate hooks☆1Updated 3 years ago
- A C port of b33f's UrbanBishop☆37Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆36Updated 3 years ago
- adding a backdooruser using win32api☆79Updated 4 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆88Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 3 years ago
- ☆22Updated 3 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆52Updated last year
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 4 years ago
- A repo to hold any bypasses I work on/study/whatever☆18Updated 3 years ago