Bypass-UAC
Bypass-UAC provides a framework to perform UAC bypasses based on auto elevating IFileOperation COM object method calls.
Bypass-UAC provides a framework to perform UAC bypasses based on auto elevating IFileOperation COM object method calls. This is not a new technique, traditionally, this is accomplished by injecting a DLL into "explorer.exe". This is not desirable because injecting into explorer may trigger security alerts and working with unmanaged DLL's makes for an inflexible work-flow.
Link: https://github.com/FuzzySecurity/PowerShell-Suite/tree/master/Bypass-UAC
Usage
Bypass-UAC is self-contained and does not have any dependencies, bar a requirement that the target have PowerShell v2.
Methods:
Run:
Win10 Example
Last updated