Trending repositories for topic privilege-escalation
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of hacking / penetration testing resources to make you better!
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
A collection of links related to Linux kernel security and exploitation
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Linux enumeration tool for pentesting and CTFs with verbosity levels
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke...
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Windows Local Privilege Escalation Cookbook
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Windows Local Privilege Escalation Cookbook
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
📦 Make security testing of K8s, Docker, and Containerd easier.
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Linux enumeration tool for pentesting and CTFs with verbosity levels
A collection of links related to Linux kernel security and exploitation
A collection of hacking / penetration testing resources to make you better!
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of hacking / penetration testing resources to make you better!
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
A collection of links related to Linux kernel security and exploitation
Windows Local Privilege Escalation Cookbook
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Linux enumeration tool for pentesting and CTFs with verbosity levels
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Windows Local Privilege Escalation Cookbook
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
📦 Make security testing of K8s, Docker, and Containerd easier.
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Linux enumeration tool for pentesting and CTFs with verbosity levels
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of hacking / penetration testing resources to make you better!
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
A collection of links related to Linux kernel security and exploitation
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Windows Local Privilege Escalation Cookbook
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Linux enumeration tool for pentesting and CTFs with verbosity levels
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges ...
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Automation for internal Windows Penetrationtest / AD-Security
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke...
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Windows Local Privilege Escalation Cookbook
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam
Modular penetration testing platform that enables you to write, test, and execute exploit code.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of hacking / penetration testing resources to make you better!
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Windows Local Privilege Escalation Cookbook
A collection of links related to Linux kernel security and exploitation
Linux enumeration tool for pentesting and CTFs with verbosity levels
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke...
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
Automation for internal Windows Penetrationtest / AD-Security
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the...
Windows Local Privilege Escalation Cookbook
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
¿Quieres empezar en el mundo hacking? En esta revista te enseño a instalar Kali Linux desde cero y a manipular herramientas esenciales en el Hacking Ético.
Tools to bypass flawed SELinux policies using the init_module system call
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Create file system symbolic links from low privileged user accounts within PowerShell
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Modular penetration testing platform that enables you to write, test, and execute exploit code.