Home / exploits Windows UAC Protection Bypass
Posted on 13 December 2018
This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS.