process launch engine · windows

InvokerZERO

A dark Electron app for launching executables with full control over elevation, parent process identity, and window metadata.

invokerzero · by 7n7 (1cwo)

Full control over how things run.

Three launch modes, process tracking, spoofing tools, and a clean log — all in a single borderless window.

UAC Bypass via COMPAT_LAYER
RunASA sets __COMPAT_LAYER=RunAsInvoker in a temporary batch file, launching the exe without triggering a UAC prompt regardless of its manifest.
PPID Spoofing
Uses CreateProcess with PROC_THREAD_ATTRIBUTE_PARENT_PROCESS via inline C# to make the process appear as a child of explorer.exe.
Window Title Renaming
Calls SetWindowText via user32.dll P/Invoke to rename any tracked process's window title at runtime.
Process Tracker
Tracks every process launched through InvokerZERO with PID, launch method, start time, and live/dead status. Kill them directly from the UI.
Args & Working Directory
Pass custom CLI arguments and override the working directory for any launch. Drag and drop .exe files directly onto the window.
Colored Output Log
A selectable, syntax-highlighted log that color-codes PIDs, method names, arrows, and file paths. Styled for readability in the dark UI.
RunASA COMPAT_LAYER
Writes a temporary .bat file with SET __COMPAT_LAYER=RunAsInvoker and launches via cmd.exe. Bypasses UAC elevation prompts even on manifested executables.
RunWOA Direct Spawn
Standard spawn() with no elevation. Uses the current user's token. Falls back with a clear error message if the exe requires elevation.
PPID Spoof CreateProcess
Launches with explorer.exe as the spoofed parent via STARTUPINFOEX and UpdateProcThreadAttribute. Makes the child process appear to belong to the shell.
Get InvokerZERO

Download the prebuilt installer for Windows. Supports drag & drop, recent files, and three independent launch methods out of the box.

Download

// windows only · electron · portable