Statistics for topic privilege-escalation
RepositoryStats tracks 595,858 Github repositories, of these 77 are tagged with the privilege-escalation topic. The most common primary language for repositories using this topic is Python (22).
Stargazers over time for topic privilege-escalation
Most starred repositories for topic privilege-escalation (view more)
Trending repositories for topic privilege-escalation (view more)
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
A collection of hacking / penetration testing resources to make you better!
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
📦 Make security testing of K8s, Docker, and Containerd easier.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of hacking / penetration testing resources to make you better!
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The project models the problem as a sequence of actions to achie...
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
📦 Make security testing of K8s, Docker, and Containerd easier.
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of hacking / penetration testing resources to make you better!
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The project models the problem as a sequence of actions to achie...
Tools to bypass flawed SELinux policies using the init_module system call
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Linux & Android Kernel Vulnerability research and exploitation
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The project models the problem as a sequence of actions to achie...
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of hacking / penetration testing resources to make you better!
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Windows Local Privilege Escalation Cookbook
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
Linux & Android Kernel Vulnerability research and exploitation
Windows Local Privilege Escalation Cookbook
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs