Here are
67 public repositories
matching this topic...
List of Awesome Red Teaming Resources
Defeating Windows User Account Control
Undetectable Windows Payload Generation
-
Updated
Jul 12, 2019
-
Python
Resources About Windows Security. 1100+ Open Source Tools. 3300+ Blog Post and Videos.
Electron subprocesses with administrative privileges, prompting the user with an OS dialog if necessary.
-
Updated
Feb 26, 2019
-
JavaScript
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Tiny and portable USB device/host stack for embedded system with USB IP
Windows UAC bypass techniques implemented and written in Go
Minimalistic RBAC package for Go applications
Embedding a "UAC-Bypassing" function into your custom payload
-
Updated
Sep 30, 2020
-
Python
Python library for requesting root privileges
-
Updated
Feb 6, 2021
-
Python
Escalation / Bypass Windows UAC
A helper class library to detect, manage and use UAC functionalities in your program.
Small utility written in c++ to bypass windows UAC prompt
-
Updated
Oct 23, 2020
-
Python
UIAccess UAC Bypass using token duplication and keyboard events
-
Updated
Sep 26, 2019
-
Python
🐤 Some of my antiUAC Scripts for Rubbber Ducky 🐤
Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯
wconv - Converting Windows native formats into human readable form
-
Updated
Aug 17, 2020
-
Python
PowerShell script to bypass UAC using DCCW
-
Updated
Jul 29, 2017
-
PowerShell
THIS MODULE HAS BEEN DEPRECATED. See the README.md for more information.
-
Updated
Sep 30, 2020
-
PowerShell
Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.
A golang package for retrieving values from the Microsoft LDAP property, `UserAccountControl`
Program bypasses the UAC prompt for Admin privileges when running a program.
-
Updated
Jan 9, 2018
-
Batchfile
Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.
Windows executable "de-escalator".
Improve this page
Add a description, image, and links to the
uac
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
uac
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.