-
Updated
Oct 22, 2020 - Python
privilege-escalation
Here are 110 public repositories matching this topic...
-
Updated
Oct 10, 2020
-
Updated
Sep 28, 2020
-
Updated
Sep 18, 2020 - PowerShell
-
Updated
Aug 30, 2020
-
Updated
Oct 14, 2020
-
Updated
Oct 19, 2020 - Shell
-
Updated
Jan 14, 2019 - C++
-
Updated
Mar 30, 2020 - C
-
Updated
Oct 22, 2020 - PowerShell
-
Updated
Sep 24, 2020 - Shell
-
Updated
Sep 14, 2020 - Python
-
Updated
Sep 17, 2020
-
Updated
Oct 15, 2020 - PowerShell
-
Updated
Feb 22, 2018 - Python
-
Updated
Sep 4, 2020 - PowerShell
-
Updated
Mar 25, 2020 - Python
-
Updated
May 9, 2019 - Python
-
Updated
Jul 21, 2020 - Shell
-
Updated
Sep 16, 2020 - Pascal
-
Updated
Aug 20, 2020
-
Updated
Feb 20, 2020
-
Updated
Oct 2, 2019 - Python
-
Updated
Oct 21, 2020 - Go
-
Updated
Oct 9, 2020 - Python
-
Updated
Oct 11, 2019 - Ruby
-
Updated
Dec 23, 2019
-
Updated
Apr 2, 2020 - Python
Improve this page
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."
Current implementation of
proclistplugin useswin32_ps_list_procs()php function on Windows host.Therefore, linux implementation is a simple
system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.A better implementation should avoid relying on system command execution.