Skip to content

💻 Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

Notifications You must be signed in to change notification settings

FreakX23/WinPwnage

 
 

Repository files navigation

💻 WinPwnage

The meaning of this repo is to study the techniques. All of the samples/techniques are found online, on different blogs and repos here on GitHub. I do not take cred for any of the findings, thanks to all the researchers! Rewrote all of them and ported it to Python. Some of the code is not tested at all, but should work anyway.

Windows 10:
  • sdclt_uac_bypass
  • sdclt_control_uac_bypass
  • event_viewer_uac_bypass
  • fodhelper_uac_bypass
  • image_file_execution
  • admin_to_system
  • registry_persistence
Windows 8:
  • slui_file_hijack
  • sysprep_dll_hijack
  • admin_to_system
  • registry_persistence
Windows 7:
  • cliconfig_dll_hijack
  • sysprep_dll_hijack
  • fax_dll_hijack
  • mcx2prov_dll_hijack
  • event_viewer_uac_bypass
  • sdclt_control_uac_bypass
  • admin_to_system
  • registry_persistence

Read:

About

💻 Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%