GitHub / Offensive-Panda / C2_Elevated_Shell_DLL_Hijcking
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Offensive-Panda%2FC2_Elevated_Shell_DLL_Hijcking
PURL: pkg:github/Offensive-Panda/C2_Elevated_Shell_DLL_Hijcking
Stars: 24
Forks: 3
Open issues: 1
License: mit
Language: C++
Size: 7.81 KB
Dependencies parsed at: Pending
Created at: over 3 years ago
Updated at: about 1 year ago
Pushed at: about 1 year ago
Last synced at: about 1 year ago
Topics: bypass, dll-injection, metasploit, shellcode, windows-10, windows-11-bypass