#
privilege-escalation-exploits
Here are
24 public repositories
matching this topic...
Linux privilege escalation auditing tool
-
Updated
Jul 17, 2021
-
Shell
Collection of things made during my OSCP journey
-
Updated
Feb 22, 2018
-
Python
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
-
Updated
May 3, 2021
-
Shell
Linux Privilege Escalation Tool By WazeHell
-
Updated
Apr 12, 2019
-
Shell
-
Updated
Jul 13, 2021
-
PowerShell
Bypass UAC by hijacking a DLL located in the Native Image Cache
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Brahma - Privilege elevation exploit for Nintendo 3DS
Bypass UAC by abusing the Internet Explorer Add-on installer
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
AppXSVC Service race condition - privilege escalation
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
x64 Windows privilege elevation using anycall
Privilege escalation in Docker
-
Updated
Oct 11, 2020
-
Shell
-
Updated
Apr 28, 2021
-
Shell
A very short batch file which allows you torun anything with admin rights without prompting user.
-
Updated
Jan 4, 2019
-
Batchfile
Bypass UAC by abusing shell protocol handlers
Copy & paste from original code for support ALL Windows Versions
SafetyKatz is a combination of slightly modified version of
@gentilkiwi's Mimikatz project and
@subTee's .NET PE Loader
A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。
-
Updated
Nov 12, 2020
-
Shell
Privilege Escalation Exploits
Improve this page
Add a description, image, and links to the
privilege-escalation-exploits
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
privilege-escalation-exploits
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.