COLLECTED BY
Organization:
Internet Archive
Focused crawls are collections of frequently-updated webcrawl data from narrow (as opposed to broad or wide) web crawls, often focused on a single domain or subdomain.
The Wayback Machine - https://web.archive.org/web/20220726124455/https://github.com/topics/privilege-escalation
Here are
201 public repositories
matching this topic...
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Updated
Jul 24, 2022
Python
A collection of hacking / penetration testing resources to make you better!
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Updated
Jul 6, 2022
PowerShell
A collection of links related to Linux kernel security and exploitation
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Automation for internal Windows Penetrationtest / AD-Security
Updated
Jul 3, 2022
PowerShell
Linux enumeration tool for pentesting and CTFs with verbosity levels
Updated
Jul 21, 2022
Shell
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Privilege Escalation Enumeration Script for Windows
Updated
Jun 8, 2022
PowerShell
Fancy reverse and bind shell handler
Updated
Jul 6, 2022
Python
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Updated
Jun 23, 2022
PowerShell
My proof-of-concept exploits for the Linux kernel
ODAT: Oracle Database Attacking Tool
Updated
Jun 20, 2022
Python
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Updated
May 17, 2022
Rust
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Updated
Apr 12, 2022
HTML
Collection of things made during my OSCP journey
Updated
Feb 24, 2022
Python
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
MSDAT: Microsoft SQL Database Attacking Tool
Updated
Jun 20, 2022
Python
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A curated list of awesome privilege escalation
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Updated
May 9, 2019
Python
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Updated
Jun 20, 2022
Python
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Updated
Jul 9, 2022
Shell
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Updated
Mar 27, 2022
Pascal
Improve this page
Add a description, image, and links to the
privilege-escalation
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
privilege-escalation
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Current implementation of
proclistplugin useswin32_ps_list_procs()php function on Windows host.Therefore, linux implementation is a simple
system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.A better implementation should avoid relying on system command execution.