A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
-
Updated
Feb 13, 2022 - C++
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。
My write-ups for UIUCTF 2020
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subTee's .NET PE Loader
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
Vulnerable Flask E-Commerce Cyber Security Group 120
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Copy & paste from original code for support ALL Windows Versions
privilege escalation POCs built in Rust.
Shark - An Awesome Linum Enum Suite
Introduction to information security, exploiting a vulnerable ISO.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
Linux & Android Kernel Vulnerability research and exploitation
Bypass UAC by abusing shell protocol handlers
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Privilege escalation in Docker
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."