Offensive-Panda / C2_Elevated_Shell_DLL_Hijcking

DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
37Updated 6 months ago

Related projects

Alternatives and complementary repositories for C2_Elevated_Shell_DLL_Hijcking