local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
-
Updated
Oct 31, 2023 - C++
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
Bypass UAC by hijacking a DLL located in the Native Image Cache
Bypass UAC by abusing shell protocol handlers
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC by abusing the Internet Explorer Add-on installer
x64 Windows privilege elevation using anycall
Copy & paste from original code for support ALL Windows Versions
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."