The Wayback Machine - https://web.archive.org/web/20210815132914/https://github.com/topics/privilege-escalation
Here are
160 public repositories
matching this topic...
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Updated
Aug 11, 2021
Python
A collection of hacking / penetration testing resources to make you better!
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Updated
Jul 15, 2021
PowerShell
A collection of links related to Linux kernel security and exploitation
⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Automation for internal Windows Penetrationtest / AD-Security
Updated
Aug 12, 2021
PowerShell
Linux enumeration tool for pentesting and CTFs with verbosity levels
Updated
Jul 20, 2021
Shell
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Privilege Escalation Enumeration Script for Windows
Updated
Aug 13, 2021
PowerShell
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Updated
May 30, 2021
Shell
My proof-of-concept exploits for the Linux kernel
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Updated
Nov 14, 2020
PowerShell
ODAT: Oracle Database Attacking Tool
Updated
Jul 21, 2021
Python
Fancy reverse and bind shell handler
Updated
Aug 12, 2021
Python
Collection of things made during my OSCP journey
Updated
Feb 22, 2018
Python
MSDAT: Microsoft SQL Database Attacking Tool
Updated
Mar 9, 2021
Python
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Updated
May 9, 2019
Python
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
A curated list of awesome privilege escalation
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Updated
Aug 5, 2021
Pascal
A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Updated
Jul 28, 2021
Shell
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Updated
Aug 15, 2021
Python
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Updated
May 3, 2021
Shell
Improve this page
Add a description, image, and links to the
privilege-escalation
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
privilege-escalation
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Current implementation of
proclistplugin useswin32_ps_list_procs()php function on Windows host.Therefore, linux implementation is a simple
system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.A better implementation should avoid relying on system command execution.