Hi There today I published a checklist of strategies on Linux Privilege Escalation by Tib3rius
☆11Mar 31, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-PrivEsc-cheatsheat
Users that are interested in Linux-PrivEsc-cheatsheat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exp of cve-2019-12272☆20Jul 10, 2019Updated 6 years ago
- ☆15Jan 4, 2021Updated 5 years ago
- ☆15Dec 1, 2021Updated 4 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Tool for lokcing steam chivements☆14Nov 25, 2021Updated 4 years ago
- ☆16Apr 6, 2023Updated 2 years ago
- ☆13Jan 22, 2024Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Firma Digital☆12May 8, 2015Updated 10 years ago
- Use your Sun Microsystems Type 7 Keyboard in Microsoft Windows (Properly, with lettered alt graph mappings and even a supplemental mathem…☆24Nov 7, 2011Updated 14 years ago
- ☆13Jun 28, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- ☆29May 19, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ATM security list☆13Aug 10, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Aiogram FastAPI template with webhooks to deploy on Render for telegram bots☆18May 3, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Code in the presentation☆21Oct 28, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Example: Client-Side Template Injection with Vue☆25Feb 20, 2023Updated 3 years ago
- ☆12Jan 31, 2022Updated 4 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Machine Learning on dataset HTTP CSIC 2010☆35May 25, 2018Updated 7 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Dec 5, 2022Updated 3 years ago
- Python scripts to audit and harden the 2014-2017 Microsoft SQL Server☆10Jun 5, 2020Updated 5 years ago
- A Chrome Extension that helps you avoid playing cheaters☆26Jan 15, 2025Updated last year
- Puppet module that hardens Windows Server to DoD STIG compliance☆14Sep 11, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fake Email Flutter App You can create a temporary email address that can get rid of messages and receive emails immediately☆21Dec 6, 2023Updated 2 years ago
- PCI-DSS toolkit to help scope web applications☆18Jun 8, 2016Updated 9 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Files and Programs for UAV and Drone Cybersecurity Workshop☆37Sep 6, 2023Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆12Sep 10, 2022Updated 3 years ago