Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
-
Updated
Apr 21, 2026 - C
Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
Windows UAC bypass implementation using COM elevation monikers. Leverages ICMLuaUtil interface to execute processes with elevated privileges.
Add a description, image, and links to the elevation-moniker topic page so that developers can more easily learn about it.
To associate your repository with the elevation-moniker topic, visit your repo's landing page and select "manage topics."