winscripting / UAC-bypassLinks
☆230Updated 8 years ago
Alternatives and similar repositories for UAC-bypass
Users that are interested in UAC-bypass are comparing it to the libraries listed below
Sorting:
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆199Updated 5 years ago
- Generates malicious LNK file payloads for data exfiltration☆423Updated 8 years ago
- Example DLL to load from Windows NetShell☆182Updated 9 years ago
- Bypass for PowerShell Constrained Language Mode☆400Updated 3 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆354Updated 10 months ago
- ☆479Updated 2 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆247Updated 5 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 5 years ago
- Tool to create hidden registry keys.☆488Updated 5 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- Malicious Shortcut(.lnk) Generator☆197Updated 6 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆233Updated 2 years ago
- Bypass AMSI by patching AmsiScanBuffer☆273Updated 4 years ago
- ☆494Updated 8 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆421Updated last year
- ☆363Updated 4 years ago
- Tools for discovery and abuse of COM hijacks☆330Updated 6 years ago
- ☆153Updated last month
- Manipulating and Abusing Windows Access Tokens.☆283Updated 4 years ago
- Steal a primary token and spawn cmd.exe using the stolen token☆258Updated 4 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆217Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆313Updated 3 years ago
- Remote Command Executor: A OSS replacement for PsExec and RunAs - or Telnet without having to install a server. Take your pick :)☆359Updated 7 years ago
- ☆257Updated 6 years ago
- Inject PowerShell into any process☆239Updated 6 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- A modular C2 framework☆490Updated last month
- MSBuildShell, a Powershell Host running within MSBuild.exe☆292Updated 6 years ago