Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for privilege escalation
privilege-escalation
x
200 search results found
Payloadsallthethings
⭐
55,999
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Awesome Hacking Resources
⭐
14,679
A collection of hacking / penetration testing resources to make you better!
Traitor
⭐
6,329
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
K8tools
⭐
5,502
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/ Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jbos
Infosec_reference
⭐
5,348
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Linux Kernel Exploitation
⭐
5,116
A collection of links related to Linux kernel security and exploitation
Active Directory Exploitation Cheat Sheet
⭐
4,672
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Awesome Pentest Cheat Sheets
⭐
3,617
Collection of the cheat sheets useful for pentesting
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
Winpwn
⭐
3,151
Automation for internal Windows Penetrationtest / AD-Security
Linux Smart Enumeration
⭐
3,029
Linux enumeration tool for pentesting and CTFs with verbosity levels
Privilege Escalation
⭐
2,698
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Privesccheck
⭐
2,438
Privilege Escalation Enumeration Script for Windows
Powerupsql
⭐
2,127
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
Sudo_killer
⭐
2,032
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Phpsploit
⭐
2,000
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Awesome Oscp
⭐
1,962
A curated list of awesome OSCP resources
Pwncat
⭐
1,796
Fancy reverse and bind shell handler
Coercer
⭐
1,452
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
Odat
⭐
1,405
ODAT: Oracle Database Attacking Tool
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Juicy Potato
⭐
1,268
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Kernel Exploits
⭐
1,265
My proof-of-concept exploits for the Linux kernel
Wadcoms.github.io
⭐
1,158
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Awesome Privilege Escalation
⭐
1,052
A curated list of awesome privilege escalation
Deepce
⭐
1,040
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Metarget
⭐
957
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Linuxprivchecker
⭐
934
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Torat
⭐
907
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Msdat
⭐
754
MSDAT: Microsoft SQL Database Attacking Tool
Oscp
⭐
749
Collection of things made during my OSCP journey
Windows Local Privilege Escalation Cookbook
⭐
710
Windows Local Privilege Escalation Cookbook
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Ctf Notes
⭐
574
Everything needed for doing CTFs
Exploits
⭐
568
A handy collection of my public exploits, all in one place.
0xsp Mongoose
⭐
529
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Dirty_sock
⭐
510
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Roothelper
⭐
474
A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.
Portia
⭐
469
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Suid3num
⭐
393
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Petitpotato
⭐
358
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Rottenpotato
⭐
356
RottenPotato local privilege escalation from service account to SYSTEM
Eviltree
⭐
348
A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlighting those that contain matches.
Awesome Windows Red Team
⭐
340
A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Windows Post Exploitation
⭐
324
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Msfmania
⭐
321
Python AV Evasion Tools
Windows Coerced Authentication Methods
⭐
316
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
Beurk
⭐
291
BEURK Experimental Unix RootKit
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Elevationstation
⭐
253
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
Linuxtq
⭐
252
《Linux提权方法论》
Uptux
⭐
244
Linux privilege escalation checks (systemd, dbus, socket fun, etc)
Cve 2020 0796 Lpe Poc
⭐
242
CVE-2020-0796 Local Privilege Escalation POC
Leprechaun
⭐
236
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Oscp
⭐
235
Our OSCP repo: from popping shells to mental health.
Comahawk
⭐
230
Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322
Poc_cve 2018 1002105
⭐
216
PoC for CVE-2018-1002105.
Splunkwhisperer2
⭐
207
Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations
Yodo
⭐
199
Local Privilege Escalation
Pe Linux
⭐
178
Linux Privilege Escalation Tool By WazeHell
Lucifer
⭐
177
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Roguepotato
⭐
168
Another Windows Local Privilege Escalation from Service Account to System
Cve 2020 0668
⭐
165
Use CVE-2020-0668 to perform an arbitrary privileged file move operation.
Orca
⭐
157
Advanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions !
Cve 2020 0796 Lpe Poc
⭐
155
CVE-2020-0796 Local Privilege Escalation POC
Invoke Printdemon
⭐
154
This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.
Portia
⭐
152
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Pe Linux
⭐
151
Linux Privilege Escalation Tool By WazeHell
Gtfoplus
⭐
149
Linux Local Privesc Helper and Agent
Byeintegrity Uac
⭐
143
Bypass UAC by hijacking a DLL located in the Native Image Cache
Mida Multitool
⭐
140
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Os X 10.11.6 Exp Via Pegasus
⭐
140
Local privilege escalation for OS X 10.11.6 via PEGASUS
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Dllspy
⭐
133
DLL Hijacking Detection Tool
Golazagne
⭐
128
Go library for credentials recovery
Systemd Service Hardening
⭐
127
Basic guide to harden systemd services
System3
⭐
126
Climber
⭐
124
Check UNIX/Linux systems for privilege escalation
Winsystemhelper
⭐
124
A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.
Cve 2019 1215
⭐
123
Inspector
⭐
120
The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, check kernel version, check history file, get possible exploit ...
Linux Kernel Exploitation
⭐
119
Linux kernel exploitation lab.
Pytmipe
⭐
115
Python library and client for token manipulations and impersonations for privilege escalation on Windows
Roguewinrm
⭐
112
Windows Local Privilege Escalation from Service Account to System
Sudohulk
⭐
110
try privilege escalation changing sudo command
Cve 2018 0952 Systemcollector
⭐
105
PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service
Localadminsharp
⭐
98
.NET executable to use when dealing with privilege escalation on Windows to gain local administrator access
Trebuchet
⭐
93
MS15-076 Privilege Escalation
Macos 10.12.2 Exp Via Mach_voucher
⭐
92
Local Privilege Escalation for macOS 10.12.2 via mach_voucher and XNU port Feng Shui
Pentest Service Enumeration
⭐
89
Suggests programs to run against services found during the enumeration phase of a Pentest
Security Research
⭐
84
Security Research
Cve 2020 1034
⭐
81
PoC demonstrating the use of cve-2020-1034 for privilege escalation
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Rootsh
⭐
74
Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.
Iam Deescalate
⭐
71
IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)
Slui File Handler Hijack Privilege Escalation
⭐
69
Slui File Handler Hijack UAC Bypass Local Privilege Escalation
Cve 2020 3153
⭐
69
Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal
1-100 of 200 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.