Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for privesc
privesc
x
63 search results found
Traitor
⭐
6,329
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Pspy
⭐
4,505
Monitor linux processes without root permissions
Linux Smart Enumeration
⭐
3,029
Linux enumeration tool for pentesting and CTFs with verbosity levels
Cloudgoat
⭐
2,330
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Windows Privesc Check
⭐
1,377
Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems
Unix Privesc Check
⭐
800
Automatically exported from code.google.com/p/unix-privesc-check
Oscp
⭐
749
Collection of things made during my OSCP journey
Purplepanda
⭐
573
Identify privilege escalation paths within and across different clouds
Powershell Red Team
⭐
437
Collection of PowerShell functions a Red Teamer may use in an engagement
Tater
⭐
351
Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec
Oscp
⭐
235
Our OSCP repo: from popping shells to mental health.
Unix Privesc
⭐
220
Local UNIX PrivEsc Aggregation
Gtfoblookup
⭐
206
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
Botpeass
⭐
185
Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.
Gtfoplus
⭐
149
Linux Local Privesc Helper and Agent
Patch Checker
⭐
135
Web-based check for Windows privesc vulnerabilities
Defcon24
⭐
115
DefCon24
Windows Privesc
⭐
110
Basics of Windows privilege escalation
Oscp Automation
⭐
106
A collection of personal scripts used in hacking excercises.
Localadminsharp
⭐
98
.NET executable to use when dealing with privilege escalation on Windows to gain local administrator access
Wpc Ps
⭐
68
Windows Privesc Check - PowerShell
Kitt Lite
⭐
63
Python-Based Pentesting CLI Tool
Tryhackme Write Up
⭐
56
The entire walkthrough of all my resolved TryHackMe rooms
Gogsownz
⭐
54
Gogs CVEs
Reg1c1de
⭐
53
Registry permission scanner written in C# for finding potential privesc avenues within registry
Some Tools
⭐
52
Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.
Sqli Postgres Rce Privesc Hacking Playground
⭐
52
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
Oscp Preparation Material
⭐
50
All in One OSCP Preparation Material
My Pentesting Repo
⭐
47
This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds the reminders useful, then enjoy! A few links for useful tools and files. Some tools written by me.
Oscp Omnibus
⭐
46
A collection of resources I'm using while working toward the OSCP
Candypotato
⭐
45
Pure C++, weaponized, fully automated implementation of RottenPotatoNG
Twiga
⭐
44
A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports android 4.2 to android 7.1.1
Cve 2019 18634
⭐
41
A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc
Privescker
⭐
37
Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in one go.
Sharppolarbear
⭐
30
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Localroot
⭐
28
Collection of tools for privesc on Linux
Pwk Oscp
⭐
27
Empower your enumeration during OSCP
Unix Security File Parser
⭐
26
Automatically exported from code.google.com/p/unix-security-file-parser
Etwkeylogger_pse
⭐
26
PowerShell Empire module for logging USB keystrokes via ETW
Cve 2018 1000001
⭐
26
glibc getcwd() local privilege escalation compiled binaries
Writeups
⭐
24
A repository for all the THM & HTB challenges that I've solved!
Pentesting_notes
⭐
23
Cyberstuff
⭐
22
This Script installs useful tools and stuff for pen-testing purpose.
Danspecial
⭐
21
Weaponizing Gigabyte driver for priv escalation and bypass PPL
Ggtfobins
⭐
17
Get GTFOBins info about a given exploit from the command line
Clippy
⭐
15
Terribad PrivEsc enumeration script for Windows systems
Offensiveactivedirectory
⭐
15
A set of instructions, command and techniques that help during an Active Directory Assessment.
Lib2shell
⭐
14
Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument injection, file overwrites, LD_PRELOAD, etc.).
Fubar
⭐
14
Formidable Unix Binary Arsenal & Repository. TUI built for offline payload generation, retrieval, and exfiltration.
Favtools
⭐
13
Tools that i use n love :D
Shotovuln
⭐
12
An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.
Docker Privesc
⭐
12
Privilege escalation in Docker
Haxxor Tools
⭐
12
Pentesting resources
Find Vulnerablesoftware
⭐
10
Get a list of installed software in a safe manner
Winpe
⭐
10
Windows privilege escalation with cmd
Prepkal
⭐
9
Simple script to download some missing tools in Kali
Infosec Manual
⭐
8
Open-source methodology on pentesting and risk mitigation
Ndh2018
⭐
8
Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)
Kitt
⭐
6
Python-Based Pentesting Framework
Luckycheck
⭐
5
Modular Privesc ToolBox Add or Remove Tools as you want just with 4 lines and 6 lines for making it looks good ;)
Wptsextensions.dll
⭐
5
WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.
Ill
⭐
5
🐧 I Love Linux (ILL) is a C tool developed to fast search for kernel vulnerabilities and suggest to the user
Fakelib.sh
⭐
5
Simple tool/script for generating malicious Linux shared libraries
1-63 of 63 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.