Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
-
Updated
May 14, 2024 - Shell
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Linux privilege escalation auditing tool
system3, Samsung's worst nightmare for a 3rd time!
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Linux & Android Kernel Vulnerability research and exploitation
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
整理一些内网常用渗透小工具
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
privilege escalation POCs built in Rust.
Privilege escalation in Docker
Vulnerable Flask E-Commerce Cyber Security Group 120
Collection of things made during my OSCP journey
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Introduction to information security, exploiting a vulnerable ISO.
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."