OSCP Privilege Escalation MindMap/Guide
☆198Apr 4, 2022Updated 3 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-MindMap
Users that are interested in Linux-Privilege-Escalation-MindMap are comparing it to the libraries listed below
Sorting:
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- It is a compilation of some resources for preparing for OSCP.☆204May 1, 2022Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- ☆133Jul 14, 2021Updated 4 years ago
- ☆210Oct 23, 2022Updated 3 years ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆571Feb 13, 2026Updated 2 weeks ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆279Aug 4, 2021Updated 4 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆394Dec 19, 2020Updated 5 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,149May 13, 2023Updated 2 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- ☆47Jan 1, 2018Updated 8 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- ☆13Sep 15, 2018Updated 7 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,103Dec 9, 2025Updated 2 months ago
- My OSCP notes☆225Jul 17, 2024Updated last year
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆550Jul 16, 2021Updated 4 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆67Oct 1, 2022Updated 3 years ago
- ☆20Jul 4, 2022Updated 3 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆862Oct 23, 2022Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- Tool to discover external and internal network attack surface☆203May 21, 2024Updated last year
- AppSec Payloads Arsenal for Pentration Tester and Bug Bounty Hunters☆917Feb 19, 2026Updated last week
- ☆13Apr 8, 2021Updated 4 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- ☆13Jul 30, 2021Updated 4 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- ☆49Jul 14, 2020Updated 5 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆483May 8, 2025Updated 9 months ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago