aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorheqnx <root@heqnx.com>2025-04-25 13:40:44 +0300
committerheqnx <root@heqnx.com>2025-04-25 13:40:44 +0300
commitef021ad6ef66c4438c67a8ba7465f6462e1529a7 (patch)
tree22b97fc7cf355473e932fb0c0a06e4d65fd45b00 /README.md
parent8257b544588a7a1d37698f2d2efb885967c8d313 (diff)
downloadSharpRIDHijack-ef021ad6ef66c4438c67a8ba7465f6462e1529a7.tar.gz
SharpRIDHijack-ef021ad6ef66c4438c67a8ba7465f6462e1529a7.zip
removed installer mention, removed that function
Diffstat (limited to 'README.md')
-rw-r--r--README.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md
index 7c9042c..8a4d7be 100644
--- a/README.md
+++ b/README.md
@@ -1,6 +1,6 @@
# SharpRIDHijack
-`SharpRIDHijack` is an offensive security tool designed for performing RID (Relative Identifier) hijacking on Windows systems. It escalates privileges by impersonating the SYSTEM account and modifying the SAM registry to assign an administrative RID to a specified user account. The tool supports both command-line and installer-based execution.
+`SharpRIDHijack` is an offensive security tool designed for performing RID (Relative Identifier) hijacking on Windows systems. It escalates privileges by impersonating the SYSTEM account and modifying the SAM registry to assign an administrative RID to a specified user account.
> **WARNING**: This tool is for **authorized security testing only**. Unauthorized use may violate laws and regulations. The author and contributors are not responsible for misuse. Always obtain explicit permission before testing any system.