A PoC DLL injection library for runtime hooking of ActiveX controls with UDP command interface built with Microsoft Detours 🔌
-
Updated
Oct 11, 2025 - C++
A PoC DLL injection library for runtime hooking of ActiveX controls with UDP command interface built with Microsoft Detours 🔌
Windows UAC bypass implementation using COM elevation monikers. Leverages ICMLuaUtil interface to execute processes with elevated privileges.
Windows UAC bypass tool using the DLL injection technique. It loads the DLL entirely from memory without touching the disk.
Add a description, image, and links to the com-interface topic page so that developers can more easily learn about it.
To associate your repository with the com-interface topic, visit your repo's landing page and select "manage topics."