An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
-
Updated
May 16, 2022 - CSS
{{ message }}
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Linux privilege escalation auditing tool
Collection of things made during my OSCP journey
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Linux Privilege Escalation Tool By WazeHell
Bypass UAC by hijacking a DLL located in the Native Image Cache
整理一些内网常用渗透小工具
Bypass UAC by abusing the Internet Explorer Add-on installer
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Brahma - Privilege elevation exploit for Nintendo 3DS
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
AppXSVC Service race condition - privilege escalation
Bypass UAC at any level by abusing the Task Scheduler and environment variables
x64 Windows privilege elevation using anycall
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC by abusing shell protocol handlers
Privilege escalation in Docker
Copy & paste from original code for support ALL Windows Versions
POCs built in Rust
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subTee's .NET PE Loader
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
Shark - An Awesome Linum Enum Suite
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
Token impersonation to escalate from administrator to SYSTEM in the Rust language
A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。
My write-ups for UIUCTF 2020
A Windows privilege escalation tool that leverages access tokens to gain a reverse shell as SYSTEM.
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."