wwh1004 / AmsiBypassUacDetectorView external linksLinks
Detect BypassUAC using AMSI
☆29Feb 18, 2025Updated 11 months ago
Alternatives and similar repositories for AmsiBypassUacDetector
Users that are interested in AmsiBypassUacDetector are comparing it to the libraries listed below
Sorting:
- tsh多终端代理通信☆19Feb 26, 2025Updated 11 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ASPX ShellCode Loader☆54Jan 27, 2024Updated 2 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Basic Psexec clone, but in golang.☆16Jul 2, 2022Updated 3 years ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 5 months ago
- Java Chains 插件编写 demo☆14Mar 5, 2025Updated 11 months ago
- ☆38Oct 16, 2025Updated 4 months ago
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 7 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆91Aug 21, 2025Updated 5 months ago
- 通过ptr记录使用ip反查内网域名☆16Sep 10, 2024Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆107Aug 18, 2025Updated 5 months ago
- can convert EXE/DLL into position-independent shellcode☆40Feb 1, 2026Updated 2 weeks ago
- ☆19Jan 25, 2024Updated 2 years ago
- reverse engineering random malwares☆22Feb 1, 2025Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 9 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆135Jul 21, 2025Updated 6 months ago
- ☆144May 22, 2024Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- ☆18Nov 23, 2023Updated 2 years ago
- 高版本Fastjson在Java原生反序列化中的利用演示☆26Jan 12, 2025Updated last year
- ☆86Jan 21, 2025Updated last year
- Detect VirtualBox, SandBox, Emulator, Debugger, Hosting, Processes in C#☆20Jun 23, 2020Updated 5 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 5 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 9 months ago
- User Mode Windows Rootkit☆71Jan 5, 2024Updated 2 years ago
- 白文件patch☆26Aug 14, 2024Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆187Aug 6, 2025Updated 6 months ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆96Mar 20, 2023Updated 2 years ago
- 适用于某EHR&HRM的加解密工具,可直接用于sqlmap☆25Jan 14, 2024Updated 2 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Mar 6, 2025Updated 11 months ago
- UAC Bypass using UIAccess program QuickAssist☆210Nov 30, 2025Updated 2 months ago
- Beacon compiled using clang☆73Jan 22, 2023Updated 3 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 9 months ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- 在线安软识别☆12Aug 6, 2025Updated 6 months ago