100 Days of Red Team<p>Demonstration of couple of UAC bypass methods using Havoc C2.</p><p><a href="https://100daysofredteam.medium.com/using-havoc-c2-to-bypass-uac-b3a93c33442a" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">100daysofredteam.medium.com/us</span><span class="invisible">ing-havoc-c2-to-bypass-uac-b3a93c33442a</span></a></p><p><a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveSecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>