ThePirateWhoSmellsOfSunflowers
ThePirateWhoSmellsOfSunflowers
Same error as @Kruxinator, but your workaround is ok :+1: A little bit unrelated but on my W10 lab machine, i can't test the full chain because the .bat is...
Indeed, with Safecheck False, it's ok...well almost because now, I figure out that my VM seems to be patched against the exploit. Maybe you can add a check for patched...
@Clemenzah are you sure your system is vulnerable ?
Hi, Unfortunately, your module fails on my lab. On my W10 test machine:  On Empire side: ``` (Empire: powershell/privesc/bypassuac_slui) > Job started: G2XR3U Property : {}...
On another test VM:  However if I use the ps1 alone, it works. :sunflower:
Weeeelllllll, I think I misunderstood. From the beginning I tried to use your module like a normal empire bypass UAC module : launch it and wait for the new agent...
I'll give a try to implement the correct method, I'll submit a new PR based on this one. :sunflower:
Hello, I had the same behavior during my last assessment. On an infected W10, it was impossible to use `management/spawn`, but `management/spawnas` with the same account was OK. Moreover `management/spawas`...
Hey, I quickly perform some tests but was unable to reproduce this behavior on my lab (W10 pro). 🌻
Hello, Same behavior here, webapp is barely usable with a room of 15+ members. Tested with Chromium snap ubuntu (110.0.5481.100) and uBlock Origin. :sunflower: