An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
-
Updated
May 13, 2024 - CSS
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Linux privilege escalation auditing tool
Collection of things made during my OSCP journey
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
整理一些内网常用渗透小工具
Linux Privilege Escalation Tool By WazeHell
Bypass UAC by hijacking a DLL located in the Native Image Cache
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC by abusing the Internet Explorer Add-on installer
system3, Samsung's worst nightmare for a 3rd time!
x64 Windows privilege elevation using anycall
Bypass UAC at any level by abusing the Task Scheduler and environment variables
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Privilege escalation in Docker
Brahma - Privilege elevation exploit for Nintendo 3DS
AppXSVC Service race condition - privilege escalation
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."