There are 29 repositories under windows-privilege-escalation topic.
A collection of hacking / penetration testing resources to make you better!
Privilege Escalation Enumeration Script for Windows
Abusing impersonation privileges through the "Printer Bug"
Windows Privilege Escalation Techniques and Scripts
collect for learning cases
Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting
Manipulating and Abusing Windows Access Tokens.
Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
Weaponizing for privileged file writes bugs with windows problem reporting
poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)
Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking
Weaponizing for privileged file writes bugs with PrintNotify Service
Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM
OSCP notes, commands, tools, and more.
CVE-2021-1675 (PrintNightmare)
Windows Privilege Escalation
Windows Privilege Escalation
Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s
Windows Privilege Escalation
Phanto is a utility that specializes in UAC bypass and privilege escalation, enabling it to bypass User Account Control on Windows 10 and 11 systems and attain Administrator privileges.
Windows Privilege Escalation
DLL Hijacking using DLL Proxying technique
A living notebook containing the details of frequent as well as unique attack techniques, cmds for various security tools etc.
Windows Privilege Escalation
Solving the Hackthebox Labs and creating walkthrough
This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test
Try to create walkthroughs of Tryhackme-Labs, self learning purpose