Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
-
Updated
Dec 19, 2025 - C
Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
Windows UAC bypass implementation using COM elevation monikers. Leverages ICMLuaUtil interface to execute processes with elevated privileges.
Add a description, image, and links to the bypass-technique topic page so that developers can more easily learn about it.
To associate your repository with the bypass-technique topic, visit your repo's landing page and select "manage topics."