We have hosted the application uacme in order to run this application in our online workstations with Wine or directly.
Quick description about uacme:
Run executable from command line, akagi32 [Key] [Param] or akagi64 [Key] [Param]. First parameter is a number of methods to use, second is an optional command (executable file name including full path) to run. The second parameter can be empty - in this case, the program will execute elevated cmd.exe from the system32 folder. Since 3.5.0 version all "fixed" methods are considered obsolete and removed altogether with all supporting code/units. If you still need them. This tool shows ONLY popular UAC bypass method used by malware, and re-implement some of them in a different way improving original concepts. There are different, not yet known to the general public, methods. This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft, use it at your own risk.Features:
- Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.
- x86-32/x64 Windows 7/8/8.1/10 (client, some methods however works on server version too)
- Admin account with UAC set on default settings required
- Windows 10 support and testing policy
- If you run this program on real computer remember to remove all program leftovers
- UACMe comes with full source code, written in C
Programming Language: C.
Categories:
©2024. Winfy. All Rights Reserved.
By OD Group OU – Registry code: 1609791 -VAT number: EE102345621.