winscripting / UAC-bypassLinks
☆237Updated 8 years ago
Alternatives and similar repositories for UAC-bypass
Users that are interested in UAC-bypass are comparing it to the libraries listed below
Sorting:
- Generates malicious LNK file payloads for data exfiltration☆439Updated 8 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆359Updated last year
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆431Updated last year
- Manipulating and Abusing Windows Access Tokens.☆287Updated 5 years ago
- ☆481Updated 2 years ago
- ☆504Updated 8 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆240Updated 2 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- Bypass for PowerShell Constrained Language Mode☆403Updated 4 years ago
- Tool to create hidden registry keys.☆490Updated 6 years ago
- Example DLL to load from Windows NetShell☆182Updated 9 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆348Updated 5 years ago
- DLL and PowerShell script to assist with finding DLL hijacks☆340Updated 5 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆202Updated 5 years ago
- Bypass AMSI by patching AmsiScanBuffer☆278Updated 4 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆331Updated 5 years ago
- Malicious Shortcut(.lnk) Generator☆200Updated 7 years ago
- Inject PowerShell into any process☆249Updated 6 years ago
- ☆362Updated 4 years ago
- Steal a primary token and spawn cmd.exe using the stolen token☆258Updated 5 years ago
- A modular C2 framework☆503Updated last week
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆522Updated 3 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Updated 3 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆430Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Updated 6 months ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆537Updated 3 years ago
- Tools for discovery and abuse of COM hijacks☆331Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆814Updated 6 years ago
- This is a weaponized WSUS exploit☆299Updated 3 years ago