winscripting / UAC-bypassLinks
☆229Updated 8 years ago
Alternatives and similar repositories for UAC-bypass
Users that are interested in UAC-bypass are comparing it to the libraries listed below
Sorting:
- Generates malicious LNK file payloads for data exfiltration☆422Updated 8 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆355Updated 11 months ago
- Example DLL to load from Windows NetShell☆183Updated 9 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆345Updated 5 years ago
- ☆479Updated 2 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆248Updated 5 years ago
- Bypass for PowerShell Constrained Language Mode☆402Updated 3 years ago
- Tools for discovery and abuse of COM hijacks☆330Updated 6 years ago
- ☆363Updated 4 years ago
- Malicious Shortcut(.lnk) Generator☆198Updated 6 years ago
- Bypass AMSI by patching AmsiScanBuffer☆275Updated 4 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆331Updated 5 years ago
- Steal a primary token and spawn cmd.exe using the stolen token☆258Updated 4 years ago
- Manipulating and Abusing Windows Access Tokens.☆285Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆815Updated 5 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆199Updated 5 years ago
- A modular C2 framework☆492Updated last week
- ☆498Updated 8 years ago
- Tool to create hidden registry keys.☆489Updated 6 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆145Updated 4 years ago
- DLL and PowerShell script to assist with finding DLL hijacks☆340Updated 5 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆234Updated 2 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆424Updated last year
- 2018 School project - PoC of malware code obfuscation in Word macros☆153Updated 4 years ago
- Chromium Cookie import / export tool☆309Updated 2 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆383Updated 5 years ago
- Windows active user credential phishing tool☆284Updated 5 years ago
- getsystem via parent process using ps1 & embeded c#☆448Updated 2 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆421Updated 3 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆399Updated 5 years ago