y11en / BabyBypass
看起来叫BabyBypass,实际啥都会记一些
☆15Updated last year
Alternatives and similar repositories for BabyBypass:
Users that are interested in BabyBypass are comparing it to the libraries listed below
- ☆19Updated 2 years ago
- 自用的shellcode生成框架☆30Updated last year
- DiagTrack Eop (From Service Account to SYSTEM)☆22Updated 2 years ago
- Hide Port In Windows☆38Updated 5 months ago
- 域前置版本FRP☆15Updated 2 years ago
- ☆40Updated last year
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- desktop screenshot☆29Updated last year
- UAC_wenpon☆48Updated 3 years ago
- ☆26Updated last year
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆66Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- Enable RDP and set firewall by Windows API.☆19Updated 3 years ago
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆32Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆21Updated 9 months ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- Proofs-Of-360Security Sandbox Escape☆10Updated 3 years ago
- Reflective DLL injection Execution☆19Updated 2 years ago
- ☆10Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆43Updated 2 years ago
- use aswArPot.sys to kill process☆67Updated 2 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆54Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated 2 years ago
- Load ssp dll golang implementation☆19Updated 3 years ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆51Updated last year