Hi There today I published a checklist of strategies on Linux Privilege Escalation by Tib3rius
☆11Mar 31, 2023Updated 3 years ago
Alternatives and similar repositories for Linux-PrivEsc-cheatsheat
Users that are interested in Linux-PrivEsc-cheatsheat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exp of cve-2019-12272☆20Jul 10, 2019Updated 6 years ago
- ☆15Jan 4, 2021Updated 5 years ago
- ☆15Dec 1, 2021Updated 4 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Tool for lokcing steam chivements☆14Nov 25, 2021Updated 4 years ago
- ☆16Apr 6, 2023Updated 3 years ago
- ☆13Jan 22, 2024Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Firma Digital☆12May 8, 2015Updated 10 years ago
- Use your Sun Microsystems Type 7 Keyboard in Microsoft Windows (Properly, with lettered alt graph mappings and even a supplemental mathem…☆24Nov 7, 2011Updated 14 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Jun 28, 2023Updated 2 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- ☆29May 19, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ATM security list☆13Aug 10, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Aiogram FastAPI template with webhooks to deploy on Render for telegram bots☆18May 3, 2024Updated last year
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code in the presentation☆21Oct 28, 2021Updated 4 years ago
- Example: Client-Side Template Injection with Vue☆25Feb 20, 2023Updated 3 years ago
- ☆12Jan 31, 2022Updated 4 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated 2 years ago
- Machine Learning on dataset HTTP CSIC 2010☆35May 25, 2018Updated 7 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Dec 5, 2022Updated 3 years ago
- Python scripts to audit and harden the 2014-2017 Microsoft SQL Server☆10Jun 5, 2020Updated 5 years ago
- A Chrome Extension that helps you avoid playing cheaters☆26Jan 15, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Puppet module that hardens Windows Server to DoD STIG compliance☆14Sep 11, 2019Updated 6 years ago
- Fake Email Flutter App You can create a temporary email address that can get rid of messages and receive emails immediately☆21Dec 6, 2023Updated 2 years ago
- PCI-DSS toolkit to help scope web applications☆18Jun 8, 2016Updated 9 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Files and Programs for UAV and Drone Cybersecurity Workshop☆38Sep 6, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago