-
Notifications
You must be signed in to change notification settings - Fork 384
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How this tool is use?? #53
Comments
Sure can do! 👍 If you want to scan the system for possible UAC bypasses, you pass these args: For example if you want to use "Fodhelper UAC bypass" you pass these arguments: |
thank you 👍🏻 |
I did not know that the tool should be installed on the target computer. This tool is useless if there is no internet on the target computer. I thought it could be used to upgrade the authorization after receiving the shell. |
Well it depends on what you're going to use it for. The repo is to study the techniques so... But for example, it could be used to elevate malware without UAC showing up, or elevate from Administrator to System. You're right, you need to have access on the computer already, from a shell or other type of access. |
I set it up.How this tool is used. There are no documents. Can you write a few examples?
The text was updated successfully, but these errors were encountered: