There are 147 repositories under privilege-escalation topic.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of hacking / penetration testing resources to make you better!
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of links related to Linux kernel security and exploitation
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
一个攻防知识库。A knowledge base for red teaming and offensive security.
Linux enumeration tool for pentesting and CTFs with verbosity levels
Automation for internal Windows Penetrationtest / AD-Security
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Privilege Escalation Enumeration Script for Windows
Fancy reverse and bind shell handler
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
ODAT: Oracle Database Attacking Tool
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
My proof-of-concept exploits for the Linux kernel
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
A curated list of awesome privilege escalation
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
Windows Local Privilege Escalation Cookbook
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Collection of things made during my OSCP journey
MSDAT: Microsoft SQL Database Attacking Tool
Linux privilege escalation exploit via snapd (CVE-2019-7304)
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)