README.md
Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. This project demonstrates various UAC bypass techniques and serves as an educational resource for understanding Windows security mechanisms.
⚠️ Warning: This tool demonstrates security vulnerabilities that could be exploited maliciously. Use responsibly and only in controlled environments.
Run the executable from command line using the following syntax:
akagi32.exe [Method_Number] [Optional_Command]
or
akagi64.exe [Method_Number] [Optional_Command]
akagi32.exe 23
akagi64.exe 61
akagi32.exe 23 c:\windows\system32\calc.exe
akagi64.exe 61 c:\windows\system32\charmap.exe
<details> <summary>Keys (click to expand/collapse)</summary>Note: Since version 3.5.0, all previously "fixed" methods are considered obsolete and have been removed. If you need them, use v3.2.x branch.
Important Notes:
⚠️ Important Security and Usage Information:
The most effective protection against UAC bypass techniques is using an account without administrative privileges.
UACMe is written in C and requires Microsoft Visual Studio 2019 or later to build from source.
Configure Platform ToolSet (Project->Properties->General):
Set Target Platform Version (Project->Properties->General):
Build Process:
Note: Compiled binaries are not provided and will never be provided. This serves as a barrier against malicious usage and helps maintain the educational purpose of this project.
If you find this project interesting, you can buy me a coffee
BTC (Bitcoin): bc1qzkvtpa0053cagf35dqmpvv9k8hyrwl7krwdz84q39mcpy68y6tmqsju0g4
(c) 2014 - 2026 UACMe Project