We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 74c08ce commit 092e7b9Copy full SHA for 092e7b9
modules/exploits/windows/local/bypassuac_fodhelper.rb
@@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Local
24
25
def initialize(info={})
26
super(update_info(info,
27
- 'Name' => 'Windows Escalate UAC Protection Bypass (Via FodHelper Registry Key)',
+ 'Name' => 'Windows UAC Protection Bypass (Via FodHelper Registry Key)',
28
'Description' => %q{
29
This module will bypass Windows 10 UAC by hijacking a special key in the Registry under
30
the current user hive, and inserting a custom command that will get invoked when
0 commit comments