Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack privilege escalation
attack
x
privilege-escalation
x
11 search results found
Active Directory Exploitation Cheat Sheet
⭐
4,672
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Awesome Windows Red Team
⭐
340
A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Byeintegrity Uac
⭐
143
Bypass UAC by hijacking a DLL located in the Native Image Cache
Byeintegrity8 Uac
⭐
38
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Byeintegrity2 Uac
⭐
28
Bypass UAC by abusing the Internet Explorer Add-on installer
Byeintegrity3 Uac
⭐
20
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Byeintegrity5 Uac
⭐
17
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Byeintegrity4 Uac
⭐
11
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Byeintegrity Lite
⭐
5
Bypass UAC by abusing shell protocol handlers
Related Searches
Python Attack (2,252)
Javascript Attack (693)
Attack Adversarial (590)
Security Attack (533)
C Attack (491)
Java Attack (408)
C Plus Plus Attack (305)
Attack Exploitation (218)
Attack Penetration Testing (171)
1-11 of 11 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.