Exchange-AD-Privesc
Exchange AD Privilege Escalation Tools
Provides scripts and techniques to exploit vulnerabilities in Microsoft Exchange deployments on Active Directory
Exchange privilege escalations to Active Directory
728 stars
26 watching
113 forks
Language: PowerShell
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
ayoul3/privesc | Tools for exploiting privilege escalation vulnerabilities on z/OS systems | 79 |
hausec/adape-script | Automates Active Directory assessment and privilege escalation using a collection of scripts | 1,092 |
nullarray/roothelper | A collection of scripts for aiding in privilege escalation on Linux systems | 485 |
rsmudge/elevatekit | A PowerShell module for demonstrating third-party privilege escalation attacks with Cobalt Strike's Beacon payload | 891 |
mr-un1k0d3r/elevate-system-trusted-bof | Tool to bypass Windows security restrictions and gain elevated privileges | 146 |
arthepsy/cve-2021-4034 | A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,056 |
nickvourd/windows-local-privilege-escalation-cookbook | A comprehensive resource providing techniques and tools for elevating privileges on Windows systems through misconfigurations and vulnerabilities | 981 |
sagishahar/lpeworkshop | A workshop providing a comprehensive guide to local privilege escalation on Linux and Windows operating systems. | 1,879 |
atalii/adage | A simple and secure alternative to sudo and doas for running commands with elevated privileges. | 6 |
rvn0xsy/cve_2020_0796_cna | Represents a proof-of-concept for exploiting a vulnerability to gain privileged access on Windows 10 systems | 78 |
dec0ne/krbrelayup | A tool that exploits vulnerabilities in Kerberos authentication to bypass local privilege restrictions on Windows domain environments. | 1,529 |
rhinosecuritylabs/gcp-iam-privilege-escalation | A collection of GCP IAM privilege escalation methods and their associated tools | 343 |
med0x2e/ntlmrelay2self | A toolset to exploit a Windows vulnerability allowing an attacker to gain elevated privileges on the local system by using NTLM authentication over HTTP. | 394 |
octoberfest7/killdefender_bof | A tool that allows an attacker to elevate privileges and gain control over the Windows Defender service | 62 |
ccob/sweetpotato | Provides tools and techniques for exploiting Windows privilege escalation vulnerabilities from service accounts to SYSTEM. | 1,622 |