EventViewerUAC_BOF
UAC bypass tool
A tool that bypasses UAC restrictions on Windows by deserializing and executing malicious code in Event Viewer.
Beacon Object File implementation of Event Viewer deserialization UAC bypass
129 stars
7 watching
29 forks
Language: C
last commit: over 3 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Tools and techniques to bypass Windows UAC restrictions on executable files by utilizing DCOM objects | 119 |
| | A technique to bypass Windows UAC security restrictions using a DLL planting method for executing malicious code in high integrity processes. | 190 |
| | A centralized resource for bypassing Windows Device Guard Application Whitelisting (WDAC) policies. | 489 |
| | Tool to bypass ETW (Event Tracing for Windows) security measure in remote processes by injecting a custom syscall | 276 |
| | A tool that allows an attacker to elevate privileges and gain control over the Windows Defender service | 62 |
| | An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| | Exploits ALPC and mmc to bypass Windows UAC for administrative privileges. | 155 |
| | A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| | An extension that automatically adds headers to Burp requests to bypass certain Web Application Firewall products. | 330 |
| | A tool that bypasses AMSI in a remote process with code injection. | 377 |
| | A tool for generating obfuscated executable files to evade antivirus detection | 902 |
| | A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 70 |
| | Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| | A tool used to bypass Windows Defender by manipulating process integrity and privileges | 156 |
| | An extension that bypasses Web Application Firewalls by padding HTTP requests with dummy data | 4 |