Bypass UAC by hijacking a DLL located in the Native Image Cache
-
Updated
Nov 21, 2021 - C++
Bypass UAC by hijacking a DLL located in the Native Image Cache
Bypass UAC by abusing the Internet Explorer Add-on installer
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
x64 Windows privilege elevation using anycall
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC by abusing shell protocol handlers
Copy & paste from original code for support ALL Windows Versions
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."