RoqueNight / Linux-Privilege-Escalation-Basics
Simple and accurate guide for linux privilege escalation tactics
☆171Updated 9 months ago
Related projects: ⓘ
- Script for generating revshells☆451Updated last week
- improving...☆131Updated 2 weeks ago
- Tips on how to write exploit scripts (faster!)☆397Updated 2 months ago
- Collection of reverse shells for red team operations.☆447Updated last month
- Active Directory pentesting mind map☆293Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆163Updated last week
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆270Updated 2 years ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆274Updated last year
- ☆197Updated 4 years ago
- Write-ups of the vulnhub VMs I have done, and interesting TryHackMe rooms☆106Updated last week
- Penelope Shell Handler☆590Updated this week
- Notes compiled for the OSCP exam.☆133Updated 2 years ago
- my kali desktop setup☆258Updated 3 months ago
- My OSCP Prep Sandbox!!☆112Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆295Updated 3 weeks ago
- A RedTeam Toolkit☆377Updated 7 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆541Updated last week
- ☆208Updated 4 years ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆72Updated last month
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆696Updated 4 months ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆356Updated 3 years ago
- Sticky notes for pentesting, bug bounty, CTF.☆592Updated this week
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆487Updated this week
- This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.☆487Updated last month
- A simple tool for bypassing file upload restrictions.☆755Updated last month
- Ultimate Burp Suite Exam and PortSwigger Labs Guide.☆194Updated last year
- PHP shells that work on Linux OS, macOS, and Windows OS.☆451Updated 11 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆187Updated 2 months ago
- Active Directory Wordlists☆84Updated 4 years ago
- SSTI Payload Generator☆87Updated 2 years ago