🚀 A C# clone of a native UAC bypass method using IFileOperation with elevated COM interface abuse and DLL hijacking of ATL.dll inside Wbem directory.
- 🛡️ Masquerades as
explorer.exe - 📦 Patches entrypoint of DLL with minimal shellcode
- 🪄 Drops and plants
ATL.dllintowbem\ - 🔥 Launches
WmiMgmt.mscto trigger payload - 🧹 Self-cleans dropped DLL afterwards
This code is intended for educational and research purposes only.
- Visual Studio 2022+
- .NET Framework 4.8
- Release x64 mode highly recommended.
MIT License (see LICENSE)