From af0b0d643809802156c71e31546ca4fc3a2e7f1b Mon Sep 17 00:00:00 2001 From: hfiref0x Date: Wed, 22 Jun 2022 19:38:15 +0700 Subject: [PATCH] Update README.md Add link to #129 --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 9510f0b..0e29f76 100644 --- a/README.md +++ b/README.md @@ -872,6 +872,7 @@ https://devblogs.microsoft.com/oldnewthing/20160816-00/?p=94105 * Utilizing Programmatic Identifiers (ProgIDs) for UAC Bypasses, https://v3ded.github.io/redteam/utilizing-programmatic-identifiers-progids-for-uac-bypasses * MSDT DLL Hijack UAC bypass, https://blog.sevagas.com/?MSDT-DLL-Hijack-UAC-bypass * UAC bypass through .Net Deserialization vulnerability in eventvwr.exe, https://twitter.com/orange_8361/status/1518970259868626944 +* Advanced Windows Task Scheduler Playbook - Part.2 from COM to UAC bypass and get SYSTEM directly, http://www.zcgonvh.com/post/Advanced_Windows_Task_Scheduler_Playbook-Part.2_from_COM_to_UAC_bypass_and_get_SYSTEM_dirtectly.html # Authors