Detect BypassUAC using AMSI
☆30Feb 18, 2025Updated last year
Alternatives and similar repositories for AmsiBypassUacDetector
Users that are interested in AmsiBypassUacDetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- ☆14Jul 29, 2024Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 10 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆107Aug 21, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- ASPX ShellCode Loader☆54Jan 27, 2024Updated 2 years ago
- 通过RPC创建计划任务☆31May 18, 2025Updated 11 months ago
- Attack Active Directory Trusts with a single tool☆13Jan 15, 2025Updated last year
- ☆143May 22, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 8 months ago
- ☆38Oct 16, 2025Updated 6 months ago
- Basic Psexec clone, but in golang.☆17Jul 2, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆114Apr 28, 2026Updated last week
- List the ETW provider(s) in the registration table of a process.☆82Sep 20, 2023Updated 2 years ago
- ☆18Nov 23, 2023Updated 2 years ago
- 适用于某EHR&HRM的加解密工具,可直接用于sqlmap☆25Jan 14, 2024Updated 2 years ago
- ☆19Jan 25, 2024Updated 2 years ago
- 通过ptr记录使用ip反查内网域名☆16Sep 10, 2024Updated last year
- Java Chains 插件编写 demo☆15Mar 5, 2025Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆144Jul 21, 2025Updated 9 months ago
- This script will not work with the latest version of chrome☆15May 11, 2025Updated 11 months ago
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- C++11 RAII memory patcher and function hooking thing☆35Oct 5, 2016Updated 9 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Origami Crypter with an updated version of the stub that bypasses windows defender.☆14Mar 13, 2025Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 10 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆101Mar 20, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool implementing process hollowing making your PE polymorphic☆16Aug 11, 2020Updated 5 years ago
- Win32 memory leak detector with ETW☆49Jan 5, 2018Updated 8 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- Detect VirtualBox, SandBox, Emulator, Debugger, Hosting, Processes in C#☆19Jun 23, 2020Updated 5 years ago
- ☆97Jan 21, 2025Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆69Aug 25, 2022Updated 3 years ago
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year