Linux privilege escalation auditing tool
-
Updated
Feb 17, 2024 - Shell
Linux privilege escalation auditing tool
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Collection of things made during my OSCP journey
整理一些内网常用渗透小工具
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Bypass UAC by hijacking a DLL located in the Native Image Cache
Linux Privilege Escalation Tool
system3, Samsung's worst nightmare for a 3rd time!
Bypass UAC by abusing the Internet Explorer Add-on installer
Brahma - Privilege elevation exploit for Nintendo 3DS
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Privilege escalation in Docker
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Linux & Android Kernel Vulnerability research and exploitation
AppXSVC Service race condition - privilege escalation
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."