Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
-
Updated
Jun 6, 2024 - Shell
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
一个攻防知识仓库 Red Teaming and Offensive Security
Privilege Escalation Enumeration Script for Windows
Bits and pieces from my personal notes and scripts
LinGhost - Linux Privilege Escalation Tool
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
This Repo consists writeups of HackTheBox machines that I've solved while preparing for OSCP.
Pentesting cheatsheet with tricks and scripts for reconnaissance, enumeration, privesc, and more...
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
📦 Make security testing of K8s, Docker, and Containerd easier.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
A comprehensive local Linux Privilege-Escalation Benchmark
Modular penetration testing platform that enables you to write, test, and execute exploit code.
A collection of security notes and procedures to use during pentests/red team assessments or as preparation for OSCP and similar exams
A collection of links related to Linux kernel security and exploitation
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."