Skip to content
#

privilege-escalation

Here are 175 public repositories matching this topic...

phpsploit
nil0x42
nil0x42 commented Oct 3, 2020

Current implementation of proclist plugin uses win32_ps_list_procs() php function on Windows host.

Therefore, linux implementation is a simple system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.

A better implementation should avoid relying on system command execution.

to be documented stealth good first issue

a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.

  • Updated Feb 14, 2022
  • Pascal

A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)

  • Updated Aug 15, 2021
  • Python

Improve this page

Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."

Learn more