{"id":27933397,"url":"https://github.com/dosx-dev/uac-exploit","last_synced_at":"2025-07-26T10:36:57.395Z","repository":{"id":145331791,"uuid":"600800152","full_name":"DosX-dev/UAC-Exploit","owner":"DosX-dev","description":"Confirmation message bypass (Win 10/11)","archived":false,"fork":false,"pushed_at":"2024-02-04T14:06:57.000Z","size":12,"stargazers_count":170,"open_issues_count":0,"forks_count":9,"subscribers_count":3,"default_branch":"main","last_synced_at":"2025-05-07T04:58:33.486Z","etag":null,"topics":["education","elevation","execution","exploit","malware","module","uac","windows"],"latest_commit_sha":null,"homepage":"https://dosx.su","language":"Visual Basic .NET","has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/DosX-dev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null},"funding":{"github":null,"patreon":null,"open_collective":null,"ko_fi":null,"tidelift":null,"community_bridge":null,"liberapay":null,"issuehunt":null,"otechie":null,"lfx_crowdfunding":null,"custom":["https://github.com/DosX-dev/DosX-dev/blob/main/donate.md"]}},"created_at":"2023-02-12T16:33:26.000Z","updated_at":"2025-04-27T00:16:58.000Z","dependencies_parsed_at":null,"dependency_job_id":"800e465e-cc7b-403f-a620-ab138f27a36c","html_url":"https://github.com/DosX-dev/UAC-Exploit","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"purl":"pkg:github/DosX-dev/UAC-Exploit","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DosX-dev%2FUAC-Exploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DosX-dev%2FUAC-Exploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DosX-dev%2FUAC-Exploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DosX-dev%2FUAC-Exploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/DosX-dev","download_url":"https://codeload.github.com/DosX-dev/UAC-Exploit/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DosX-dev%2FUAC-Exploit/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":267150480,"owners_count":24043473,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-07-26T02:00:08.937Z","response_time":62,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["education","elevation","execution","exploit","malware","module","uac","windows"],"created_at":"2025-05-07T04:58:31.293Z","updated_at":"2025-07-26T10:36:57.340Z","avatar_url":"https://github.com/DosX-dev.png","language":"Visual Basic .NET","readme":"# UAC-Exploit ( Win 10 / 11 )\n\nThe Windows operating system uses a built-in security mechanism that requires users to confirm elevated privileges in order to perform certain system-level tasks. This protection mechanism aims to prevent unauthorized access to the system and protect user data. However, some attackers can bypass this security mechanism and gain administrator access to the system without proper authentication. In this repository, I present an exploit method that bypasses the admin access confirmation requirement in Windows 10 and 11.\n\nFor educational purposes only ;)\n\n### \u003ca href=\"https://github.com/DosX-dev/UAC-Exploit/releases/download/Builds/Totally_Not_A_Virus.exe\"\u003eSAMPLE .EXE FILE\u003c/a\u003e\n### \u003ca href=\"https://github.com/DosX-dev/UAC-Exploit/blob/main/ExecuteCMD.vb\"\u003eSOURCE .VB FILE\u003c/a\u003e\n\n## ❤️✨ Special thanks\n * 👨🏼‍💻 **[@horsicq](https://github.com/horsicq)**\n","funding_links":["https://github.com/DosX-dev/DosX-dev/blob/main/donate.md"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdosx-dev%2Fuac-exploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdosx-dev%2Fuac-exploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdosx-dev%2Fuac-exploit/lists"}