Offensive-Panda / C2_Elevated_Shell_DLL_Hijcking

DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.

Date Created 2022-03-30 (2 years ago)
Commits 5 (last one 5 months ago)
Stargazers 37 (0 this week)
Watchers 1 (0 this week)
Forks 4
License mit
Ranking

RepositoryStats indexes 579,555 repositories, of these Offensive-Panda/C2_Elevated_Shell_DLL_Hijcking is ranked #523,478 (10th percentile) for total stargazers, and #532,492 for total watchers. Github reports the primary language for this repository as C++, for repositories using this language it is ranked #28,562/31,036.

Offensive-Panda/C2_Elevated_Shell_DLL_Hijcking is also tagged with popular topics, for these it's ranked: windows-10 (#370/405),  bypass (#209/235),  shellcode (#115/129)

Star History

Github stargazers over time

Watcher History

Github watchers over time, collection started in '23

Recent Commit History

5 commits on the default branch (main) since jan '22

Yearly Commits

Commits to the default branch (main) per year

Issue History

Languages

The primary language is C++ but there's also others...

updated: 2024-10-01 @ 09:29pm, id: 475851735 / R_kgDOHFzr1w