EventViewerUAC_BOF
UAC bypass tool
A tool that bypasses UAC restrictions on Windows by deserializing and executing malicious code in Event Viewer.
Beacon Object File implementation of Event Viewer deserialization UAC bypass
129 stars
7 watching
29 forks
Language: C
last commit: almost 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Tools and techniques to bypass Windows UAC restrictions on executable files by utilizing DCOM objects | 119 |
| A technique to bypass Windows UAC security restrictions using a DLL planting method for executing malicious code in high integrity processes. | 190 |
| A centralized resource for bypassing Windows Device Guard Application Whitelisting (WDAC) policies. | 489 |
| Tool to bypass ETW (Event Tracing for Windows) security measure in remote processes by injecting a custom syscall | 276 |
| A tool that allows an attacker to elevate privileges and gain control over the Windows Defender service | 62 |
| An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| Exploits ALPC and mmc to bypass Windows UAC for administrative privileges. | 155 |
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| An extension that automatically adds headers to Burp requests to bypass certain Web Application Firewall products. | 330 |
| A tool that bypasses AMSI in a remote process with code injection. | 377 |
| A tool for generating obfuscated executable files to evade antivirus detection | 902 |
| A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 70 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| A tool used to bypass Windows Defender by manipulating process integrity and privileges | 156 |
| An extension that bypasses Web Application Firewalls by padding HTTP requests with dummy data | 4 |