Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation privilege escalation
exploitation
x
privilege-escalation
x
22 search results found
Awesome Hacking Resources
⭐
14,679
A collection of hacking / penetration testing resources to make you better!
Traitor
⭐
6,329
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
K8tools
⭐
5,502
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/ Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jbos
Linux Kernel Exploitation
⭐
5,116
A collection of links related to Linux kernel security and exploitation
Active Directory Exploitation Cheat Sheet
⭐
4,672
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Awesome Pentest Cheat Sheets
⭐
3,617
Collection of the cheat sheets useful for pentesting
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
Winpwn
⭐
3,151
Automation for internal Windows Penetrationtest / AD-Security
Sudo_killer
⭐
2,032
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Kernel Exploits
⭐
1,265
My proof-of-concept exploits for the Linux kernel
Wadcoms.github.io
⭐
1,158
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Deepce
⭐
1,040
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Linuxprivchecker
⭐
934
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Oscp
⭐
749
Collection of things made during my OSCP journey
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Ctf Notes
⭐
574
Everything needed for doing CTFs
Exploits
⭐
568
A handy collection of my public exploits, all in one place.
Dirty_sock
⭐
510
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Roothelper
⭐
474
A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Suid3num
⭐
393
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Windows Post Exploitation
⭐
324
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Poc_cve 2018 1002105
⭐
216
PoC for CVE-2018-1002105.
Mida Multitool
⭐
140
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Winsystemhelper
⭐
124
A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.
Cve 2019 1215
⭐
123
Inspector
⭐
120
The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, check kernel version, check history file, get possible exploit ...
Cve 2020 3153
⭐
69
Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal
Slui File Handler Hijack Privilege Escalation
⭐
69
Slui File Handler Hijack UAC Bypass Local Privilege Escalation
Polkadots
⭐
65
CVE-2021-3560 Local PrivEsc Exploit
Archive
⭐
65
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Lxd_root
⭐
64
Linux privilege escalation via LXD
Cve 2023 22515
⭐
62
CVE-2023-22515: Confluence Broken Access Control Exploit
Localroot All Cve
⭐
61
Localroot-ALL-CVE~
Forceadmin
⭐
53
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Linux Kernel Exploits
⭐
35
Linux kernel exploits for local privilege escalation
Brahma
⭐
32
Brahma - Privilege elevation exploit for Nintendo 3DS
Pwk Oscp
⭐
27
Empower your enumeration during OSCP
Cve 2018 1000001
⭐
26
glibc getcwd() local privilege escalation compiled binaries
Cve 2023 27326
⭐
22
VM Escape for Parallels Desktop <18.1.1
Anyelevate
⭐
15
x64 Windows privilege elevation using anycall
Aio Pentesting
⭐
15
All in one Pentest methodologies - Tools and commands | Where compiled all common materials for pentester
Road To Hacking
⭐
15
¿Quieres empezar en el mundo hacking? En esta revista te enseño a instalar Kali Linux desde cero y a manipular herramientas esenciales en el Hacking Ético.
Epscalate
⭐
14
Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).
Confluence Hack
⭐
14
CVE-2023-22515
Suider
⭐
14
This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObins
Cve 2021 21551
⭐
12
arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system
Win Localpriv Escalation Polarbear
⭐
12
Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)
Cve 2021 27965
⭐
10
stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system
Filewrite2system
⭐
10
File Write Weapon for Privilege Escalation To get SYSTEM
Twicexploit
⭐
9
Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.
Mobile Heavy Artillery
⭐
8
🔥Ready, Aim, Fire.🔥
Bigphish
⭐
8
privilege escalation in OSX through systemwide root for all PID on sudo
Sharpbyebear
⭐
8
AppXSVC Service race condition - privilege escalation
Suidsploit
⭐
8
A Tool which can exploit 137 files from GTFO-Bins automaticlly
Privesc Cve 2015 5602
⭐
7
Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
Pentesting Methodology
⭐
6
When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.
Breakaday
⭐
5
A pentest tool to automate the process of scanning network, searching compromissions' paths via known vulnerabilities (such as via Common Vulnerabilities and Exposures aka CVE) and exploiting them. The main goal is to efficient the pentest in an Active Directory (or AD) infrastructure. The script is written in Python programming language.
Privesc Cve 2010 0426
⭐
5
Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Vulnerabilities Exploitation (638)
C Exploitation (545)
Security Exploitation (404)
Exploitation Penetration Testing (353)
Scanner Exploitation (249)
Exploitation Capture The Flag (227)
Attack Exploitation (218)
1-22 of 22 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.