A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Sep 9, 2024 - Python
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Privilege escalation method using writable files in /etc/crontab on linux systems. Made in Shell Script for automation during the hack (and with a special attention to CTFs)
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Linux privilege escalation auditing tool
system3, Samsung's worst nightmare for a 3rd time!
Linux & Android Kernel Vulnerability research and exploitation
local privilege escalation on windows by exploiting CMSTP to circumvent User Access Control (UAC)
整理一些内网常用渗透小工具
Enumeration tool which can help you while doing CTF's ( THM, HTB ) - Anume
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
privilege escalation POCs built in Rust.
Privilege escalation in Docker
Vulnerable Flask E-Commerce Cyber Security Group 120
Collection of things made during my OSCP journey
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."