This document summarizes the evolution of techniques for bypassing Windows User Account Control (UAC) without user interaction. It begins with an overview of UAC and integrity levels, then discusses early bypass techniques that abused objects like scheduled tasks and COM interfaces that elevate privileges silently. It traces the progression of bypass methods, from registry modifications and race conditions to more sophisticated approaches like token manipulation. The document emphasizes that mitigating UAC bypasses requires stopping the use of local administrator accounts and practicing least privilege. It directs the audience to additional resources on UAC bypass research.