privilege-escalation-exploits
There are 38 repositories under privilege-escalation-exploits topic.
The-Z-Labs/linux-exploit-suggester
Linux privilege escalation auditing tool
rmusser01/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
stealthcopter/deepce
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
ihack4falafel/OSCP
Collection of things made during my OSCP journey
Lucifer1993/PLtools
整理一些内网常用渗透小工具
AzAgarampur/byeintegrity8-uac
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
AzAgarampur/byeintegrity-uac
Bypass UAC by hijacking a DLL located in the Native Image Cache
safebuffer/PE-Linux
Linux Privilege Escalation Tool
wr3cckl3ss/system3
system3, Samsung's worst nightmare for a 3rd time!
AzAgarampur/byeintegrity2-uac
Bypass UAC by abusing the Internet Explorer Add-on installer
lu4p/go-escalate
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
patois/Brahma
Brahma - Privilege elevation exploit for Nintendo 3DS
S3cur3Th1sSh1t/SharpPolarBear
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
flast101/docker-privesc
Privilege escalation in Docker
IdanBanani/Linux-Kernel-VR-Exploitation
Linux & Android Kernel Vulnerability research and exploitation
AzAgarampur/byeintegrity5-uac
Bypass UAC at any level by abusing the Task Scheduler and environment variables
itm4n/CVEs
Random CVEs
S3cur3Th1sSh1t/SharpByeBear
AppXSVC Service race condition - privilege escalation
AzAgarampur/byeintegrity3-uac
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
paulveillard/cybersecurity-pam
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
kkent030315/anyelevate
x64 Windows privilege elevation using anycall
TheBotlyNoob/Rust-Privesc
privilege escalation POCs built in Rust.
AzAgarampur/byeintegrity4-uac
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
AzAgarampur/byeintegrity-lite
Bypass UAC by abusing shell protocol handlers
Adkali/Anume-Smart-Enumeration
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
FOGSEC/SafetyKatz
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader
Jsmoreira02/Cronjob-Exploit
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
m9nd/leidenfrost
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
socketz/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION
Copy & paste from original code for support ALL Windows Versions
x86shell/Elevat0r
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
txuswashere/Privilege-Escalation
Privilege Escalation
invelsec/Shark
Shark - An Awesome Linum Enum Suite
kibotrel/42-Boot2Root
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
kibotrel/42-SnowCrash
Introduction to information security, exploiting a vulnerable ISO.
Markor27/VulnerableFlaskEcommerce
Vulnerable Flask E-Commerce Cyber Security Group 120
cybersnippets/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF