OSCP Privilege Escalation MindMap/Guide
☆199Apr 4, 2022Updated 3 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-MindMap
Users that are interested in Linux-Privilege-Escalation-MindMap are comparing it to the libraries listed below
Sorting:
- ☆15Apr 4, 2022Updated 3 years ago
- ☆21Mar 12, 2022Updated 4 years ago
- It is a compilation of some resources for preparing for OSCP.☆205May 1, 2022Updated 3 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆212Mar 14, 2026Updated last week
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆571Feb 13, 2026Updated last month
- A Huge Learning Resources with Labs For Offensive Security Players☆1,113Dec 9, 2025Updated 3 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,159May 13, 2023Updated 2 years ago
- ☆133Jul 14, 2021Updated 4 years ago
- ☆48Jan 1, 2018Updated 8 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- My OSCP notes☆226Jul 17, 2024Updated last year
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆394Dec 19, 2020Updated 5 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆90Apr 21, 2022Updated 3 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Scripts created to use with the OSCP exercises☆47Aug 6, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆280Aug 4, 2021Updated 4 years ago
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,091Nov 8, 2025Updated 4 months ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆320May 29, 2022Updated 3 years ago
- Resources for Windows exploit development☆1,652Dec 20, 2021Updated 4 years ago
- ☆20Jul 4, 2022Updated 3 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- Scripts and things that I have created when I was doing OSCP.☆43Feb 9, 2019Updated 7 years ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆865Mar 14, 2026Updated last week
- AppSec Payloads Arsenal for Pentration Tester and Bug Bounty Hunters☆922Mar 12, 2026Updated last week
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- Retrieve LAPS password from LDAP☆437Feb 17, 2021Updated 5 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- ☆94Dec 2, 2021Updated 4 years ago