The Wayback Machine - https://web.archive.org/web/20220709144356/https://github.com/topics/privilege-escalation
Skip to content
#

privilege-escalation

Here are 196 public repositories matching this topic...

phpsploit
nil0x42
nil0x42 commented Oct 3, 2020

Current implementation of proclist plugin uses win32_ps_list_procs() php function on Windows host.

Therefore, linux implementation is a simple system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.

A better implementation should avoid relying on system command execution.

to be documented stealth good first issue

a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.

  • Updated Mar 27, 2022
  • Pascal

Improve this page

Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."

Learn more