An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
-
Updated
May 27, 2024 - CSS
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Linux privilege escalation auditing tool
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
Collection of things made during my OSCP journey
整理一些内网常用渗透小工具
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Bypass UAC by hijacking a DLL located in the Native Image Cache
Linux Privilege Escalation Tool By WazeHell
system3, Samsung's worst nightmare for a 3rd time!
Bypass UAC by abusing the Internet Explorer Add-on installer
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Brahma - Privilege elevation exploit for Nintendo 3DS
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Privilege escalation in Docker
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC at any level by abusing the Task Scheduler and environment variables
AppXSVC Service race condition - privilege escalation
x64 Windows privilege elevation using anycall
privilege escalation POCs built in Rust.
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."