<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>PyPI recent updates for UAC</title>
    <link>https://pypi.org/project/uac/</link>
    <description>Recent updates to the Python Package Index for UAC</description>
    <language>en</language>    <item>
      <title>1.0.2</title>
      <link>https://pypi.org/project/uac/1.0.2/</link>
      <description>A python library that is an exploit for UAC Bypass on Windows. It works on any version of Windows and can execute a pyload(exe) with admin access without confirmation.</description>
<author>MohammadTahaGorjiProfile@gmail.com</author>      <pubDate>Tue, 29 Jul 2025 09:39:37 GMT</pubDate>
    </item>    <item>
      <title>1.0.1</title>
      <link>https://pypi.org/project/uac/1.0.1/</link>
      <description>A python library that is an exploit for UAC Bypass on Windows. It works on any version of Windows and can execute a pyload(exe) with admin access without confirmation.</description>
<author>MohammadTahaGorjiProfile@gmail.com</author>      <pubDate>Tue, 29 Jul 2025 09:33:57 GMT</pubDate>
    </item>    <item>
      <title>1.0.0</title>
      <link>https://pypi.org/project/uac/1.0.0/</link>
      <description>A python library that is an exploit for UAC Bypass on Windows. It works on any version of Windows and can execute a pyload(exe) with admin access without confirmation.</description>
<author>MohammadTahaGorjiProfile@gmail.com</author>      <pubDate>Tue, 29 Jul 2025 09:32:19 GMT</pubDate>
    </item>  </channel>
</rss>