MyGit

0xyg3n/UAC_Exploit

Fork: 62 Star: 251 (更新于 2024-11-19 13:41:14)

license: 暂无

Language: C# .

Escalate as Administrator bypassing the UAC affecting administrator accounts only.

最后发布版本: 1.1 ( 2021-02-06 04:12:01)

官方网址 GitHub网址

UAC Exploit Developed by 0xyg3n

Escalate as Administrator bypassing the UAC on admin account!

This Source code can be utilized in many ways... for example you can achieve anything, since you can disable the AV before you execute your payload LOL.

Release can be found here also NetFramework 3.5 is required. Enjoy :)


Proof Of Concept

PoC

Why this occurs?

ComputerDefaults.exe is a native Windows 10 Microsoft digitally signed executable that has the "autoElevate" attribute set to true on it's manifest and that interacts with the Windows registry.
Therefore discovering such files with this type of interaction is interesting. Simply we must detect binaries like ComputerDefaults.exe that do not find keys in the HKCU branch in order to achieve privilege escalation.
Finally, this can result in a process running in a high integrity context executing something that is found in an HKCU branch.

Defender ByPass Found 4/02/2021

Hardcoding the Software you want to execute as administrator does not get flagged by Microsoft :)

defenderby

Defender is Sleeping....

gifdef


Affected Windows Latest (4/02/2021)

windows


UAC Settings (Default)

UAC-Settings


Already reported to Microsoft and it's not elegible for bounty program, so have fun!

Report


I have no responsibility of your actions, this is an open source project do as you wish with it.

最近版本更新:(数据更新于 2024-08-28 10:44:39)

2021-02-06 04:12:01 1.1

2021-02-04 07:22:53 1.0

主题(topics):

csharp, exploit, silent, uac, uac-authorization, uac-bypass, uacbypass, windows

0xyg3n/UAC_Exploit同语言 C#最近更新仓库

2024-11-19 11:38:46 jellyfin/jellyfin

2024-11-15 10:33:01 DigitalRuby/IPBan

2024-11-13 04:41:56 dotnet/runtime

2024-11-07 00:43:03 huiyadanli/RevokeMsgPatcher

2024-11-06 13:04:33 Pik-4/HsMod

2024-11-05 02:46:31 microsoft/PowerToys