This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.
-
Updated
Jan 28, 2023 - Python
This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.
Introduction to Computer Security with Kali Linux
All About Penetration test
this project is for learning privilege escalation and open forward
Koadic C3 COM Command & Control - JScript RAT
[Feature complete] Authenticate with keyfile and run a process as root
The second in a series of four machines, each pen-tested and explained.
Visualize Oracle DB user permissions with a network graph in the browser
Bits and pieces from my personal notes and scripts
It will show all the binaries on your system from the GTFOBins that can cause Privilege Escalation on your system.
Exploits and reports for CVE-2023-32162
CVE-2021-4034 pkexec - Linux Local Privilege Escalation
This repository describes how to exploit the Bash Shellshock vulnerability.
Bypass root with the command 'sudo' and others simples..
solutions of hack-yourself-first
42 | Privilege escalation exercices on a system image
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."