Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
-
Updated
Dec 14, 2025 - C
Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
A PoC DLL injection library for runtime hooking of ActiveX controls with UDP command interface built with Microsoft Detours 🔌
Windows UAC bypass implementation using COM elevation monikers. Leverages ICMLuaUtil interface to execute processes with elevated privileges.
Add a description, image, and links to the com-interface topic page so that developers can more easily learn about it.
To associate your repository with the com-interface topic, visit your repo's landing page and select "manage topics."