Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
-
Updated
Dec 16, 2025 - C
Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
Windows UAC bypass implementation using COM elevation monikers. Leverages ICMLuaUtil interface to execute processes with elevated privileges.
Add a description, image, and links to the com-elevation topic page so that developers can more easily learn about it.
To associate your repository with the com-elevation topic, visit your repo's landing page and select "manage topics."