Arush Agarampur
Arush Agarampur
byeintegrity8-uac
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
byeintegrity-uac
Bypass UAC by hijacking a DLL located in the Native Image Cache
byeintegrity2-uac
Bypass UAC by abusing the Internet Explorer Add-on installer
byeintegrity3-uac
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
byeintegrity4-uac
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
byeintegrity5-uac
Bypass UAC at any level by abusing the Task Scheduler and environment variables
PsForge
Process Hollowing demonstration & explanation