A tool for stealth persistence and bypassing security controls on Windows systems through shadow cache manipulation and direct syscall invocation.
-
Updated
Nov 12, 2024 - C
A tool for stealth persistence and bypassing security controls on Windows systems through shadow cache manipulation and direct syscall invocation.
[Feature complete] Edit a file that requires root access
[Feature complete] A simpler alternative to sudo and doas
[Feature complete] Authenticate with keyfile and run a process as root
WallEscape vulnerability in util-linux
Operating Systems for Embedded Systems A.Y. 2022/23 group project: a Privilege Escalation demonstration exploiting Buffer Overflow.
👻 SYSTEMatic: Systematically Seizing SYSTEM Rights. Token Impersonation POC. Alternative to PSExec for token theft. From Administrator to NT Authority\SYSTEM.
The second in a series of four machines, each pen-tested and explained.
Tools to bypass flawed SELinux policies using the init_module system call
The fourth in a series of four machines, each pen-tested and explained.
snow crash is an introduction to cybersecurity CTF like on a virtual machine
A Windows reverse shell written in C. Supports both cmd and PS and can automatically reconnect to the host
VM Escape for Parallels Desktop <18.1.1
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
42 | Privilege escalation exercices on a system image
42 | Privilege escalation exercices on a system image
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
PrivEsc using Process Token Impersonation - Search all Processes
Proof-of-Concept of the ZombieLoad-Attack for a demonstration on Intel's i7-7700k using Windows 10 Pro
Example on how to write a Linux driver
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."