This repository's purpose is to store writeups of Hackthebox machines
-
Updated
May 17, 2024
This repository's purpose is to store writeups of Hackthebox machines
Localroot-ALL-CVE~
Master cybersecurity skills with this TryHackMe free path, includes a collection of my write-ups, solutions and progress tracking.
my solves of some ctfs and some write-ups regarding security tools
Linux Privilege Escalation: cheatsheet
Bits and pieces from my personal notes and scripts
Takes all the suid binaries running in the target system and checks against suid binaries listed on GTFOBins to escalate privileges in linux/unix environment.
Post exploitation helper
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Collection of Linux PrivEsc Tools
OSCP notes, commands, tools, and more.
This script allows you to find and enumerate SUID binaries and check if one of them can be used to escalate or mantain elevated privileges in a iteractive way.
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift
CTF powered by docker with a web and a linux privilege escalation challenge
Lemon is a User Interactive bash program to search for privilege escalation vectors on Linux in an automated fashion
This script search for the bin on the https://gtfobins.github.io/ for the SUID exploit and returns the bins that have exploit available on gtfobins. So you don't need to manually search for every file on the site.
ansible-privilege-escalation is an ansible playbook you can use to make linux privilege escalation attack from user A to user B
Add a description, image, and links to the linux-privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the linux-privilege-escalation topic, visit your repo's landing page and select "manage topics."