HadessCS / Awesome-Privilege-EscalationView external linksLinks
Awesome Privilege Escalation
☆144Oct 18, 2022Updated 3 years ago
Alternatives and similar repositories for Awesome-Privilege-Escalation
Users that are interested in Awesome-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆133Oct 8, 2021Updated 4 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆35May 31, 2023Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆534May 9, 2025Updated 9 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆279Oct 8, 2025Updated 4 months ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆442Jul 8, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,266Feb 5, 2026Updated last week
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 10 months ago
- ☆159Dec 13, 2024Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Apr 29, 2025Updated 9 months ago
- Active Directory pentesting mind map☆507May 26, 2023Updated 2 years ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆18Nov 8, 2024Updated last year
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆487Apr 17, 2025Updated 9 months ago
- Azure AD cheatsheet for the CARTP course☆147May 5, 2022Updated 3 years ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆249Jun 11, 2024Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆40Aug 15, 2024Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆73Jul 29, 2024Updated last year
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated 3 weeks ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆698May 7, 2025Updated 9 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆568May 22, 2025Updated 8 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Feb 2, 2026Updated last week
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆433May 22, 2025Updated 8 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆457Aug 2, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Oct 20, 2025Updated 3 months ago
- OSCP Methodology☆57Sep 6, 2023Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆104Mar 21, 2025Updated 10 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆611Jul 31, 2025Updated 6 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated 11 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆105Jul 23, 2025Updated 6 months ago
- Embed a payload inside a PNG file☆368Oct 24, 2024Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆366Apr 19, 2023Updated 2 years ago