Skip to content

Windows UAC Bypass ─ Input an executable file and use CMSTP.exe to avoid Admin Prompt

Notifications You must be signed in to change notification settings

waived/UAC-Escaper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

  ////////////////////////////////////////////////////
 /// UAC PROMPT BYPASS - EVADE ADMIN RESTRICTIONS ///
////////////////////////////////////////////////////

Overview:
    This program uses the very simple "CMSTP Bypass" method to run an executable
    file with elevated privileges. A user selected a Windows executable file, the
    program builds a CMSTP configuartion file, and it loads it via cmspt.exe

    At this point, another prompt will open up (cmstp confirmation dialog) at which
    point the program will throw the <ENTER> key on behalf of the user (so the user
    does not have to be bothered with it) and thusforth the program will be loaded
    into memory with admin elevation. No need to address to UAC prompt or enter in
    admin credentials.

Bug report:
    None, but if you find anything, or if this bypass method finally gets patched 
    and no longer works, please leave a pull-request.



                                                                   Use responsibly!

About

Windows UAC Bypass ─ Input an executable file and use CMSTP.exe to avoid Admin Prompt

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published