← maldev README · docs/index
The privesc/* package tree groups primitives that take a
non-elevated user token and produce SYSTEM-context execution.
flowchart TB
subgraph startState [Start state]
Medium["Medium-IL token<br>(typical user)"]
end
subgraph paths [Escalation paths]
UAC["uac/*<br>fodhelper / slui /<br>silentcleanup / eventvwr"]
CVE["cve202430088/*<br>kernel TOCTOU race"]
end
subgraph end [End state]
High["High-IL token (UAC)"]
SYSTEM["NT AUTHORITY\\SYSTEM<br>(token swap)"]
end
Medium -->|admin user, UAC default| UAC
UAC --> High
Medium -->|vulnerable build < 2024-06| CVE
CVE --> SYSTEM
- uac.md — four bypass primitives (FODHelper, SLUI,
SilentCleanup, EventVwr) with build-window tables.
- cve202430088.md — CVE-2024-30088 kernel TOCTOU
race with pre-flight version probe and BSOD-risk caveat.
import (
"github.com/oioio-space/maldev/win/version"
"github.com/oioio-space/maldev/win/privilege"
)
admin, elevated, _ := privilege.IsAdmin()
switch {
case elevated:
// already there
case admin && !elevated:
// UAC bypass
case !admin:
// CVE path or credential capture
}
if info, _ := version.CVE202430088(); info.Vulnerable {
// kernel race available
}
| ID | Technique | Owners |
| T1548.002 | Bypass User Account Control | privesc/uac |
| T1068 | Exploitation for Privilege Escalation | privesc/cve202430088 |
| T1134.001 | Token Impersonation/Theft | privesc/cve202430088 (token swap) |