SkillAgentSearch skills...

Artillery

CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.

Install / Use

/learn @hackerhouse-opensource/Artillery
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Artillery

Artillery is a UAC bypass method described by the Central Intelligence Agency (CIA) Applied Engineering Department (AED) in the "Fine Dining" toolkit, which are modular components used to create malware. This module is part of the Privilege Escalation collection and is combined with other modules and payloads. The purpose is to bypass UAC and a second attack is used to obtain persistence on a host. Artillery utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator, it can then be combined with a FAX DLL injection for explorer.exe for persistence on a host. This UAC bypass and persistence has been tested on Windows 7.

License

These files are available under the 3-clause BSD license.

View on GitHub
GitHub Stars184
CategoryDevelopment
Updated14h ago
Forks33

Languages

C

Security Score

95/100

Audited on Apr 3, 2026

No findings