x0xr00t / Automated-MUlti-UAC-BypassLinks
Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022
☆452Updated last year
Alternatives and similar repositories for Automated-MUlti-UAC-Bypass
Users that are interested in Automated-MUlti-UAC-Bypass are comparing it to the libraries listed below
Sorting:
- Protected Process Dumper Tool☆569Updated 2 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆282Updated 3 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆578Updated last year
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,035Updated 2 years ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆433Updated 2 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆495Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆688Updated 7 months ago
- Kill AV/EDR leveraging BYOVD attack☆381Updated 2 years ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆531Updated 3 weeks ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆314Updated last week
- UAC Bypass By Abusing Kerberos Tickets☆503Updated 2 years ago
- Command and Control Framework written in C#☆429Updated 2 years ago
- ☆333Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆581Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆459Updated last week
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆394Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆591Updated 11 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆831Updated last year
- ☆714Updated last year
- Useful C2 techniques and cheat sheets learned from engagements☆564Updated 3 months ago
- Amsi Bypass payload that works on Windwos 11☆376Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆348Updated 2 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆374Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆442Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆618Updated last year
- Lifetime AMSI bypass☆664Updated 2 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆390Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆313Updated 2 months ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆495Updated 3 years ago