Skip to content

ScriptKiddieTutorials/Bypass-UAC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Bypass-UAC

This is a Windows privilege escalation vulnerability leveraging the misconfigured registry search paths of auto-elevating exeutables. Refer to UACME for more details.

For demonstration and convenience, I implemented the exploit in the form of macros/functions. Supported languages:

  • Batch
  • Powershell
  • Python 3

Disclaimer

This repository's code is merely a proof-of-concept and should by all means be used legally and morally.

About

PoCs of (outdated) privilege escalation vulnerability

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published