# UACMe * Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. * More info http://www.kernelmode.info/forum/viewtopic.php?f=11&t=3643 # System Requirements * x86-32/x64 Windows 7/8/8.1/10. * Admin account with UAC set on default settings required. # Usage Run executable from command line with following keys (watch debug ouput with dbgview or similar for more info): * 1 - Leo Davidson syspep method, this will work only on Windows 7 and Windows 8, used in multiple malware; * 2 - Tweaked Leo Davidson sysprep method, this will work only on Windows 8.1; * 3 - Leo Davidson method tweaked by WinNT/Pitou developers, works from Windows 7 up to Windows 10 b10041; * 4 - Application Compatibility Shim RedirectEXE method, from WinNT/Gootkit. Works from Windows 7 up to Windows 8.1; * 5 - ISecurityEditor WinNT/Simda method, used to turn off UAC, works from Windows 7 up to Windows 10 b10041. Note: * Methods (1), (2), (3), (5) require process injection, so they won't work from wow64, you need either Heavens gate or use x64 edition of this tool; * Method (4) unavailable in 64 bit edition because of Shim restriction. Run examples: * akagi32.exe 1 * akagi64.exe 3 # Warning * Using (5) method will permanently turn off UAC (after reboot), make sure to do this in test environment or don't forget to re-enable UAC after tool usage; * This tool is not intended for AV tests and not tested to work in aggressive AV environment, if you still plan to use it with installed bloatware AV soft - you use it at your own risk. # Protection * UAC turned on maximum level and full awareness about every window it will show; * Account without administrative privileges. # Build * UACMe comes with full source code, written in C. * In order to build from source you need Microsoft Visual Studio 2013 U4 and later versions. # Authors (c) 2014 - 2015 UACMe Project