Offensive-Panda / C2_Elevated_Shell_DLL_Hijcking

DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
41Updated 10 months ago

Alternatives and similar repositories for C2_Elevated_Shell_DLL_Hijcking:

Users that are interested in C2_Elevated_Shell_DLL_Hijcking are comparing it to the libraries listed below