An open API service providing repository metadata for many open source software ecosystems.

GitHub / Offensive-Panda / C2_Elevated_Shell_DLL_Hijcking

DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Offensive-Panda%2FC2_Elevated_Shell_DLL_Hijcking
PURL: pkg:github/Offensive-Panda/C2_Elevated_Shell_DLL_Hijcking

Stars: 24
Forks: 3
Open issues: 1

License: mit
Language: C++
Size: 7.81 KB
Dependencies parsed at: Pending

Created at: over 3 years ago
Updated at: about 1 year ago
Pushed at: about 1 year ago
Last synced at: about 1 year ago

Topics: bypass, dll-injection, metasploit, shellcode, windows-10, windows-11-bypass

    Loading...