Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   5976

[POWERSHELL] Powershell UAC Bypass + Disable Realtime Protection + Administrative CMD

by clap - 14 May, 2020 - 10:56 PM
This post is by a banned member (clap) - Unhide
clap  
Godlike
519
Posts
134
Threads
5 Years of service
#1
UAC BYPASS
This isn't anything new. I've had this for a while actually, but, nowhere to post it. Here seems like a great place. To use this script, you just copy/paste the code into a notepad, and save it with a .ps1 (powershell) extension. Did I make this BYPASS? No. I did edit it though, and it can be used in nefarious ways with a couple extra lines. Is it meant for that? Not really, I posted it so people could learn and maybe even edit it or create something even better. However, I don't have a say in what you do with it, that's up to you. None the less, leave a like and enjoy

DOWNLOAD

Hidden Content
You must register or login to view this content.



IF THIS ISN'T IN THE CORRECT PLACE, PLEASE MOVE IT THERE. SORRY,
Always confirm via PM before dealing with me.
This post is by a banned member (Kaliaa) - Unhide
This post is by a banned member (anonymousguy198) - Unhide
17
Posts
2
Threads
5 Years of service
#3
Thank you for your contribution
This post is by a banned member (sheldon1337) - Unhide
4
Posts
0
Threads
4 Years of service
#4
Looks promising. Will try this out. :)
This post is by a banned member (whiirllp00ll) - Unhide
14
Posts
0
Threads
5 Years of service
#5
thankssssssssssssssssss
This post is by a banned member (ork10118) - Unhide
This post is by a banned member (Anouar) - Unhide
This post is by a banned member (euhjs) - Unhide
euhjs  
Supreme
435
Posts
28
Threads
5 Years of service
#8
sound interesting
pogchamp
[Image: Rscx3UU.png]

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 4 Guest(s)