ebpf-for-windows
UACME
ebpf-for-windows | UACME | |
---|---|---|
13 | 11 | |
2,592 | 5,926 | |
1.7% | - | |
9.7 | 4.8 | |
6 days ago | 20 days ago | |
C | C | |
MIT License | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ebpf-for-windows
-
Why ACPI?
There already is an eBPF for Windows, it's even Microsoft's own project https://github.com/microsoft/ebpf-for-windows
-
eBPF Verification Is Untenable
This link is about a proposed new eBPF verifier for the Linux kernel that doesn't use signing. As a research project it is not integrated to the kernel, but their plan does not involve trusting user space (instead they suggest doing the heavy lifting of the verification in user space and provide a proof of safety that the kernel checks, which seems sensible to me).
I believe you meant to link https://github.com/microsoft/ebpf-for-windows/ instead (discussed on HN recently) which is an implementation by Microsoft using the above research project that indeed does not follow the suggestion from the authors of the research project to use validation and does require trusting user space.
- eBPF for Windows
-
GitHub - microsoft/DTrace-on-Windows: Code for the cross platform, single source, OpenDTrace implementation
Somewhat funnily, Microsoft also developed eBPF for Windows.
-
ELI5: eBPF
Not for long https://github.com/microsoft/ebpf-for-windows
- Linux developers patch security holes faster than anyone else, says Google
- Linux's IPTABLES Vs OpenBSD's PF ...... Which is more secure ?
- How to add eBPF observability to your product
- eBPF implementation that runs on top of Windows
UACME
- Still being prompted for UAC despite autoElevate being true
-
Steam Showing "Purchase" Instead of "Play" for a Family Share Game
Malware can get admin rights without being run as admin. If you're running a default windows installation, you're very likely already an admin which is much more "dangerous" because of Auto-Elevate and multiple ways you can bypass UAC
-
How to compile newest version of UACME?
I am having problems compiling the newest version of UACME tool. (https://github.com/hfiref0x/UACME) I have no clue which step I am missing, but my akagi.exe is simply not working in any of the modes. :( Could someone please provide step by step support?
-
[HELP] Can you point me to a good resource for UAC Bypass technique ?
Hi, I had this issue where I had a lot of problems with UAC Bypass until I found UACME (https://github.com/hfiref0x/UACME). This is the best tool for UAC Bypass. Also, you can use Metasploit, but if you are preparing for OSCP, you should look for a way to bypass UAC without Metasploit. Hope it helps.
-
Linux developers patch security holes faster than anyone else, says Google
There's some very good points in there, but (4) is unfair. It's true that there's no boundary between a sudoer and root in Linux, but there's also no boundary between an Administrator and SYSTEM in Windows. UAC, even in the "secure" AlwaysNotify mode which uses the secure desktop, has countless unpatched bypasses[1].
Also, (3) should raise some eyebrows for readers paying attention. Cool, Microsoft removed font parsing from the kernel, how wise of them. Wait a second, why was font parsing in the kernel to begin with? With win32k.sys, it shouldn't be surprising that Microsoft has to do more legwork to bring the attack surface back down to the level of other OSes. They're also exploring the use of eBPF in the Windows kernel too[2].
[1]: https://github.com/hfiref0x/UACME
-
Script or method to Bypass Windows 10 Login
Look into UACME a short summary of the general theme of bypasse's can be found here:
-
We were backstabbed when we needed it most
The usefulness and security offered by UAC is debatable, but it's better to have it so that you can make the decision whether you want to permit the access or not when prompted. There are, of course, numerous ways to bypass UAC silently but to their credit Microsoft is making UAC more and more like a seamless sudo as time goes on.
-
How do you manage users with admin rights?
The UACME project has a tool with 70 distinct bypasses for UAC available. These bypasses are well known and documented.
-
Running MSI Afternurner (and other tools) without UAC prompt
Unfortunately I now have to add some more context, because if I don't a bunch of other InfoSec peeps are going to come here and do some chest beating. So, let's do that: UAC is nowhere near foolproof and most malware authors write malware specifically to exploit the known methods of avoiding the prompt. However, as most of you home PC owners are going to be administrators, turning off the UAC prompt completely makes no sense. So, whilst not-that-good, UAC may one day pop a Yes/No prompt where you click NO and save yourself a lot of heartache.
- hfiref0x/UACME - Defeating Windows User Account Control
What are some alternatives?
bcc - BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more
MakeMeAdmin - Make Me Admin is a simple, open-source application for Windows that allows standard user accounts to be elevated to administrator-level, on a temporary basis.
ebpf-verifier - eBPF verifier based on abstract interpretation
byeintegrity8-uac - Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
ebpf - ebpf-go is a pure-Go library to read, modify and load eBPF programs and attach them to various hooks in the Linux kernel.
gsudo - Sudo for Windows
libbpf - Automated upstream mirror for libbpf stand-alone build.
scrcpy - Display and control your Android device
xdp-tools - Utilities and example programs for use with XDP
libcurl - A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET, TFTP, WS and WSS. libcurl offers a myriad of powerful features
opensnitch - OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
smack - SMACK Software Verifier and Verification Toolchain