Collection of things made during my OSCP journey
-
Updated
Feb 24, 2022 - Python
Collection of things made during my OSCP journey
Identify privilege escalation paths within and across different clouds
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.
Modular, guided Linux privilege escalation assistant - smarter than blind enumeration
Razor installer elevation of privilege trigger + automation with Seeeduino XIAO
Script identifies all GCP permissions and checks for potential privilege escalation and post exploitation paths
A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam
CVE-2022-40297 - Proof of Concept: Privilege escalation in Ubuntu Touch 16.04 - by PIN Bruteforce
A unified, interactive CLI for remotely executing scripts, managing payloads, establishing interactive command sessions, and handling file transfers across remote environments.
This repository contains a Python 3 script designed to exploit the ClamAV privilege escalation vulnerability.
A wide collection of tools for specific exploitations...
** Deprecated! Now maintained at https://github.com/nccgroup/GTFOBLookup ** Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io)
Checker for CVE-2021-3156 with static version check
CTF simple quick writeup
Windows Privilege Escalation Assistant: A Tool to assist a pentester in Privilege Escalation on Windows targets. Only for study purposes. Use under your own responsability.
Add a description, image, and links to the privesc topic page so that developers can more easily learn about it.
To associate your repository with the privesc topic, visit your repo's landing page and select "manage topics."