Using the built-in Windows AutoElevate, BackDoor feature to bypass Windows User Account Control.
x86-32/x64 Windows 7/8/8.1/10 (client, some methods, however, works on server version too).
Required: Admin account with UAC set to default settings.
Usage of Malware:
Adware/Multiplug (9), Win32/Dyre (3), Win32/ Empercrypt (10 & 13), and the IcedID downloader are all known to employ UACMe (35 & 41). We take no responsibility for the use of this tool for #malicious purposes. It’s free, open-source, and distributed “as is” to everyone.
Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purpose.
Download Link: https://github.com/hfiref0x/UACME