nsudo update 1
nsudo update 1

Have you ever wondered how Windows Update updates system files without any issues? This can be done by TrustedInstaller.

TrustedInstaller, also known as Windows App Installer. It’s a Windows service that can update or delete system files without limitations.

TrustedInstaller can access everything on the system partition because it is running on the SYSTEM user with the highest privileges. You have probably experienced you are unable to delete a file or folder after uninstalling certain software with the message that you do not have sufficient rights to delete this folder or file.

Strange you may think, but if it is installed with TrustedInstaller you do not have sufficient rights to make changes.

NSudo System Admin Toolkit can help you solve this issue.

Release Notes:

  • Update Italian translation. (Contributed by garf02.)
  • Use VC-LTL NuGet package edition instead of standalone edition. (Thanks to mingkuang.)
  • Create NSudo Sweeper (experiment).
  • Use Windows Template Library (WTL) to build the UI.
  • Improve the website. (Contributed by 青春永不落幕.)
  • Reorganize the whole project.
  • Add Mile, Mile.Project, MINT to the project for making NSudo more modularize.
  • Improve the AppVeyor and GitHub Action CI support. (Thanks to mingkuang.)
  • Add build all targets script.
  • Update VC-LTL to 4.1.1-Beta7.
  • Fix the crash bug under the Windows 10 Build 21277. (Thanks to jgtoy.)
  • Update to .NET 5.0 for NSudo .NET Wrapper.
  • Add user manual.

Features:

  • Distributed under the MIT License.
  • Provide the x86, x86-64, ARM, ARM64 binaries.
  • Support Windows Vista and later.
  • Using VC-LTL and libkcrt from Chuyu Team for smaller binary size.
  • Using C++17, but only use core language features in the most cases.
  • NSudo Launcher
    • Launch programs with TrustedInstaller access token.
    • Launch programs with System access token.
    • Launch programs with current user access token.
      • Note: If the User Account Control has not been disabled, the privilege of this mode is similar to the standard user.
    • Launch programs with current process access token.
      • Note: The privilege of this mode is similar to the elevated user.
    • Launch programs with current process access token with the LUA restriction.
      • Note: The privilege of this mode is similar to the standard user. And the implementation is similar to the iertutil.dll’s from the Internet Explorer.
    • Support launching programs with the specified privileges option.
      • Note: “Enable All Privileges” and “Disable All Privileges”.
    • Support launching programs with the specified mandatory level (or integrity level) option.
      • Note: “System”, “High”, “Medium” and “Low”.
    • Support launching programs with the specified process priority option.
      • Note: “Idle”, “BelowNormal”, “Normal”, “AboveNormal”, “High” and “RealTime”.
    • Support launching programs with the specified window mode option.
      • Note: “Show”, “Hide”, “Maximize” and “Minimize”.
    • Support waiting for the created process to end before exiting.
    • Support launching programs with the specified current directory.
    • Support launching programs with the current console window.
    • Support shortcut list.
      • Note: You can custom it via editing NSudo.json.
    • Support multiple command line style.
    • Support multi-languages.
      • Note: Chinese Simplified, Chinese Traditional, English, French, Italian and Spanish.
    • Full High DPI Support.
      • Note: As good as the implementation from Windows Shell (conhost.exe), with the full Per-Monitor DPI-Aware support under Windows 10 Build 10240 and later version and full System DPI-Aware support under Windows Vista to Windows 8.1.
    • Full accessibility support.
      • Note: You can use NSudo Launcher with Windows Narrator smoothly.
    • High performance.
      • Note: Because it don’t need to create the windows service and the windows service process.
    • Provide C APIs and .Net Core bindings for developers.
  • NSudo Devil Mode
    • The most elegant solution for developers who want to bypass the file and registry access checks for the process with the Administrator privilege.
    • Hook APIs via the Microsoft Detours library for the maximum compatibility.
    • The binary only depend on the exported named APIs from ntdll.dll.