My write-ups for UIUCTF 2020
-
Updated
Aug 6, 2020 - PowerShell
My write-ups for UIUCTF 2020
A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。
Shark - An Awesome Linum Enum Suite
Introduction to information security, exploiting a vulnerable ISO.
Vulnerable Flask E-Commerce Cyber Security Group 120
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
Copy & paste from original code for support ALL Windows Versions
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subTee's .NET PE Loader
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
Bypass UAC by abusing shell protocol handlers
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
Linux & Android Kernel Vulnerability research and exploitation
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
privilege escalation POCs built in Rust.
x64 Windows privilege elevation using anycall
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."