winscripting / UAC-bypassLinks
☆226Updated 8 years ago
Alternatives and similar repositories for UAC-bypass
Users that are interested in UAC-bypass are comparing it to the libraries listed below
Sorting:
- Generates malicious LNK file payloads for data exfiltration☆409Updated 7 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆194Updated 4 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆352Updated 7 months ago
- Bypass for PowerShell Constrained Language Mode☆395Updated 3 years ago
- getsystem via parent process using ps1 & embeded c#☆423Updated last year
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago
- ☆489Updated 7 years ago
- Malicious Shortcut(.lnk) Generator☆198Updated 6 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆246Updated 4 years ago
- ☆474Updated 2 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆412Updated 10 months ago
- Example DLL to load from Windows NetShell☆180Updated 8 years ago
- Tool to create hidden registry keys.☆486Updated 5 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆230Updated 2 years ago
- Process Injection☆762Updated 3 years ago
- eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)☆467Updated 2 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆331Updated 5 years ago
- ☆362Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆391Updated 5 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆519Updated 2 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆533Updated 6 years ago
- A modular C2 framework☆482Updated 3 months ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆264Updated last year
- ☆260Updated 2 years ago
- Tools for discovery and abuse of COM hijacks☆322Updated 5 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆527Updated 2 years ago
- C implementation of the file-less UAC exploit☆74Updated 8 years ago
- Steal a primary token and spawn cmd.exe using the stolen token☆258Updated 4 years ago
- Manipulating and Abusing Windows Access Tokens.☆279Updated 4 years ago