Offensive-Panda / C2_Elevated_Shell_DLL_Hijcking
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
RepositoryStats indexes 595,856 repositories, of these Offensive-Panda/C2_Elevated_Shell_DLL_Hijcking is ranked #535,835 (10th percentile) for total stargazers, and #544,643 for total watchers. Github reports the primary language for this repository as C++, for repositories using this language it is ranked #29,247/31,836.
Star History
Github stargazers over time
Watcher History
Github watchers over time, collection started in '23
Recent Commit History
5 commits on the default branch (main) since jan '22
Yearly Commits
Commits to the default branch (main) per year
Issue History
Languages
The primary language is C++ but there's also others...
updated: 2024-11-14 @ 03:02am, id: 475851735 / R_kgDOHFzr1w