Detect BypassUAC using AMSI
☆30Feb 18, 2025Updated last year
Alternatives and similar repositories for AmsiBypassUacDetector
Users that are interested in AmsiBypassUacDetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆97Aug 21, 2025Updated 7 months ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- ☆14Jul 29, 2024Updated last year
- A Patchless AMSI Bypass Technique using VEH²☆32Jun 22, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- ASPX ShellCode Loader☆54Jan 27, 2024Updated 2 years ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆118Oct 30, 2025Updated 4 months ago
- 通过RPC创建计划任务☆31May 18, 2025Updated 10 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆143May 22, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆38Oct 16, 2025Updated 5 months ago
- Basic Psexec clone, but in golang.☆17Jul 2, 2022Updated 3 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆109Aug 18, 2025Updated 7 months ago
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆36Jan 18, 2026Updated 2 months ago
- dcsync bof☆46Feb 13, 2026Updated last month
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- ☆18Nov 23, 2023Updated 2 years ago
- 适用于某EHR&HRM的加解密工具,可直接用于sqlmap☆25Jan 14, 2024Updated 2 years ago
- ☆19Jan 25, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 通过ptr记录使用ip反查内网域名☆16Sep 10, 2024Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆207Mar 6, 2025Updated last year
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆137Jul 21, 2025Updated 8 months ago
- Java Chains 插件编写 demo☆15Mar 5, 2025Updated last year
- This script will not work with the latest version of chrome☆13May 11, 2025Updated 10 months ago
- Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure…☆30Updated this week
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- C++11 RAII memory patcher and function hooking thing☆35Oct 5, 2016Updated 9 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Origami Crypter with an updated version of the stub that bypasses windows defender.☆14Mar 13, 2025Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 8 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆98Mar 20, 2023Updated 3 years ago
- Win32 memory leak detector with ETW☆47Jan 5, 2018Updated 8 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- A tool implementing process hollowing making your PE polymorphic☆16Aug 11, 2020Updated 5 years ago