A professional-grade Windows security testing toolkit designed for red team operations and penetration testing. Built with pure Win32 API for maximum compatibility and minimal footprint.
⚠️ Educational & Authorized Testing Purposes Only
| Category | Capabilities |
|---|---|
| 🔍 Reconnaissance | Native system fingerprinting (UAC level, build number, elevation status) |
| 🛡️ Vulnerability Assessment | 15+ UAC bypass method compatibility detection |
| 💀 Persistence Analysis | 11 persistence technique viability scanning |
| ⚡ Execution Engine | Pure Win32 API implementation (no external dependencies) |
| 🎨 User Experience | Color-coded Python wrapper with detailed tabular reporting |
- Windows 7/10/11 (x64/x86)
- Python 3.7+ (for wrapper only)
- Visual Studio / MinGW (for compilation)
# Clone repository
git clone https://github.com/Mr-Spect3r/MyUac
cd MyUac
# Compile DLL (MSVC)
cl /LD /O2 myuac.cpp /Fe:dll/myuac.dll /link shell32.lib advapi32.lib ole32.lib
# Or using MinGW
g++ -shared -O2 -o myuac.dll dll/myuac.cpp -lshell32 -ladvapi32 -lole32pip install colorama tabulate
# Scan UAC Bypass Methods:
python MyUac.py --scan
python MyUac.py --scan-per
# Execute UAC Bypass:
python MyUac.py -m <method_id> <path_to_executable>
# Example:
python MyUac.py -m 2 C:\Windows\System32\cmd.exe
# Execute Persistence
python MyUac.py -p <method_id> <path_to_executable>
# Example:
python MyUac.py -p 5 C:\Windows\System32\cmd.exe