Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security privilege escalation
privilege-escalation
x
security
x
29 search results found
Payloadsallthethings
⭐
55,999
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Linux Kernel Exploitation
⭐
5,116
A collection of links related to Linux kernel security and exploitation
Active Directory Exploitation Cheat Sheet
⭐
4,672
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Awesome Pentest Cheat Sheets
⭐
3,617
Collection of the cheat sheets useful for pentesting
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Linuxprivchecker
⭐
934
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Dirty_sock
⭐
510
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Lucifer
⭐
177
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Golazagne
⭐
128
Go library for credentials recovery
Systemd Service Hardening
⭐
127
Basic guide to harden systemd services
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Iam Deescalate
⭐
71
IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)
Cve 2023 22515
⭐
62
CVE-2023-22515: Confluence Broken Access Control Exploit
Localroot All Cve
⭐
61
Localroot-ALL-CVE~
Linuxprivchecker
⭐
58
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Linpwn
⭐
36
Interactive Post Exploitation Tool
Selinux Kernel Module Bypass
⭐
31
Tools to bypass flawed SELinux policies using the init_module system call
Hackbox
⭐
22
Hackbox is an open-source, container-based platform that makes it easy to launch vulnerable systems to test your hacking skill!
Advisories
⭐
20
ACTIVELabs Security Advisories
Confluence Hack
⭐
14
CVE-2023-22515
Asroot
⭐
11
[Feature complete] A simpler alternative to sudo and doas
Pentesting Methodology
⭐
6
When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.
Aymansecnotes
⭐
5
This repository contains all my notes. Feel free to use them, share them or modify them.
Breakaday
⭐
5
A pentest tool to automate the process of scanning network, searching compromissions' paths via known vulnerabilities (such as via Common Vulnerabilities and Exposures aka CVE) and exploiting them. The main goal is to efficient the pentest in an Active Directory (or AD) infrastructure. The script is written in Python programming language.
Related Searches
Security Vulnerabilities (12,357)
Laravel Security (11,580)
Php Security (10,611)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
Amazon Web Services Security (874)
1-29 of 29 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.