Skip to content

A professional tool for scanning and executing UAC bypass methods

Notifications You must be signed in to change notification settings

Mr-Spect3r/MyUac

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 

Repository files navigation

🔓 UAC Bypass & Persistence Toolkit

Windows C++ Python License

Windows UAC Evasion & Persistence Detection Framework

FeaturesInstallationUsage


🎯 Overview

A professional-grade Windows security testing toolkit designed for red team operations and penetration testing. Built with pure Win32 API for maximum compatibility and minimal footprint.

⚠️ Educational & Authorized Testing Purposes Only

Screenshot|Scan Persistence


✨ Features

Category Capabilities
🔍 Reconnaissance Native system fingerprinting (UAC level, build number, elevation status)
🛡️ Vulnerability Assessment 15+ UAC bypass method compatibility detection
💀 Persistence Analysis 11 persistence technique viability scanning
⚡ Execution Engine Pure Win32 API implementation (no external dependencies)
🎨 User Experience Color-coded Python wrapper with detailed tabular reporting

Screenshot|Scan Uac

🚀 Installation

Prerequisites

  • Windows 7/10/11 (x64/x86)
  • Python 3.7+ (for wrapper only)
  • Visual Studio / MinGW (for compilation)

Build from Source

# Clone repository
git clone https://github.com/Mr-Spect3r/MyUac
cd MyUac

# Compile DLL (MSVC)
cl /LD /O2 myuac.cpp /Fe:dll/myuac.dll /link shell32.lib advapi32.lib ole32.lib

# Or using MinGW
g++ -shared -O2 -o myuac.dll dll/myuac.cpp -lshell32 -ladvapi32 -lole32

Python Wrapper Setup

pip install colorama tabulate

📖 usage

Scanning Mode

# Scan UAC Bypass Methods:

python MyUac.py --scan

Scan Persistence Techniques:

python MyUac.py --scan-per

⚡ Exploitation Mode

# Execute UAC Bypass:

python MyUac.py -m <method_id> <path_to_executable>

# Example:

python MyUac.py -m 2 C:\Windows\System32\cmd.exe
# Execute Persistence

python MyUac.py -p <method_id> <path_to_executable>
# Example:
python MyUac.py -p 5 C:\Windows\System32\cmd.exe

About

A professional tool for scanning and executing UAC bypass methods

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors