This is a Windows privilege escalation vulnerability leveraging the misconfigured registry search paths of auto-elevating exeutables. Refer to UACME for more details.
For demonstration and convenience, I implemented the exploit in the form of macros/functions. Supported languages:
- Batch
- Powershell
- Python 3
This repository's code is merely a proof-of-concept and should by all means be used legally and morally.