https://github.com/waived/uac-escaper
Windows UAC Bypass ─ Input an executable file and use CMSTP.exe to avoid Admin Prompt
https://github.com/waived/uac-escaper
bypass-admin-rights cmstp-bypass uac-bypass uac-bypass-fud uac-escaper visual-basic-net
Last synced: 3 months ago
JSON representation
Windows UAC Bypass ─ Input an executable file and use CMSTP.exe to avoid Admin Prompt
- Host: GitHub
- URL: https://github.com/waived/uac-escaper
- Owner: waived
- Created: 2025-01-12T23:40:00.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-01-12T23:47:20.000Z (5 months ago)
- Last Synced: 2025-01-13T00:25:42.556Z (5 months ago)
- Topics: bypass-admin-rights, cmstp-bypass, uac-bypass, uac-bypass-fud, uac-escaper, visual-basic-net
- Homepage:
- Size: 0 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.txt
Awesome Lists containing this project
README
////////////////////////////////////////////////////
/// UAC PROMPT BYPASS - EVADE ADMIN RESTRICTIONS ///
////////////////////////////////////////////////////Overview:
This program uses the very simple "CMSTP Bypass" method to run an executable
file with elevated privileges. A user selected a Windows executable file, the
program builds a CMSTP configuartion file, and it loads it via cmspt.exeAt this point, another prompt will open up (cmstp confirmation dialog) at which
point the program will throw the key on behalf of the user (so the user
does not have to be bothered with it) and thusforth the program will be loaded
into memory with admin elevation. No need to address to UAC prompt or enter in
admin credentials.Bug report:
None, but if you find anything, or if this bypass method finally gets patched
and no longer works, please leave a pull-request.Use responsibly!