WinPwnage: Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

WinPwnage: Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

The meaning of this repo is to study the techniques. All of the samples/techniques are found online, on different blogs and repos here on GitHub. I do not take cred for any of the findings, thanks to all the researchers! Rewrote all of them and ported it to Python. Some of the code is not tested at all but should work anyway.

-##### Windows 10:
-* sdclt_uac_bypass
-* sdclt_control_uac_bypass
-* event_viewer_uac_bypass
-* fodhelper_uac_bypass
-* image_file_execution
-* admin_to_system
-* registry_persistence

-##### Windows 8:
-* slui_file_hijack
-* sysprep_dll_hijack
-* admin_to_system
-* registry_persistence

-##### Windows 7:
-* cliconfig_dll_hijack
-* sysprep_dll_hijack
-* fax_dll_hijack
-* mcx2prov_dll_hijack
-* event_viewer_uac_bypass
-* sdclt_control_uac_bypass
-* admin_to_system
-* registry_persistence

Download

git clone https://github.com/rootm0s/WinPwnage.git

Read:

Source: https://github.com/rootm0s/

Share