Detect BypassUAC using AMSI
☆29Feb 18, 2025Updated last year
Alternatives and similar repositories for AmsiBypassUacDetector
Users that are interested in AmsiBypassUacDetector are comparing it to the libraries listed below
Sorting:
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ASPX ShellCode Loader☆54Jan 27, 2024Updated 2 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- Basic Psexec clone, but in golang.☆16Jul 2, 2022Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Aug 25, 2025Updated 6 months ago
- Java Chains 插件编写 demo☆14Mar 5, 2025Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 8 months ago
- ☆38Oct 16, 2025Updated 4 months ago
- 通过ptr记录使用ip反查内网域名☆16Sep 10, 2024Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆95Aug 21, 2025Updated 6 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 6 months ago
- can convert EXE/DLL into position-independent shellcode☆40Feb 1, 2026Updated last month
- ☆19Jan 25, 2024Updated 2 years ago
- reverse engineering random malwares☆22Feb 1, 2025Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆135Jul 21, 2025Updated 7 months ago
- ☆144May 22, 2024Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- ☆18Nov 23, 2023Updated 2 years ago
- 高版本Fastjson在Java原生反序列化中的利用演示☆26Jan 12, 2025Updated last year
- ☆86Jan 21, 2025Updated last year
- Detect VirtualBox, SandBox, Emulator, Debugger, Hosting, Processes in C#☆20Jun 23, 2020Updated 5 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 6 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- User Mode Windows Rootkit☆72Jan 5, 2024Updated 2 years ago
- 白文件patch☆26Aug 14, 2024Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆189Aug 6, 2025Updated 7 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆97Mar 20, 2023Updated 2 years ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- 适用于某EHR&HRM的加解密工具,可直接用于sqlmap☆25Jan 14, 2024Updated 2 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆204Mar 6, 2025Updated last year
- Beacon compiled using clang☆71Jan 22, 2023Updated 3 years ago
- dcsync bof☆45Feb 13, 2026Updated 3 weeks ago
- ☆14Jul 29, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago