Windows-Local-Privilege-Escalation-Cookbook
Privilege Escalation Guide
A comprehensive resource providing techniques and tools for elevating privileges on Windows systems through misconfigurations and vulnerabilities
Windows Local Privilege Escalation Cookbook
998 stars
11 watching
157 forks
Language: PowerShell
last commit: 3 months ago administratoradministrator-privilegescheatsheetcmdcookbookeoplablab-automationlocal-administrationlocal-privilege-escalationlpemicrosoftmisconfigurationoscposcp-preposeposep-preppowershellprivilege-escalationwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| Provides tools and techniques for exploiting Windows privilege escalation vulnerabilities from service accounts to SYSTEM. | 1,638 |
| A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,060 |
| A workshop providing a comprehensive guide to local privilege escalation on Linux and Windows operating systems. | 1,893 |
| Represents a proof-of-concept for exploiting a vulnerability to gain privileged access on Windows 10 systems | 79 |
| A toolset to exploit a Windows vulnerability allowing an attacker to gain elevated privileges on the local system by using NTLM authentication over HTTP. | 394 |
| A tool that exploits vulnerabilities in Kerberos authentication to bypass local privilege restrictions on Windows domain environments. | 1,544 |
| Tools for exploiting privilege escalation vulnerabilities on z/OS systems | 79 |
| Tool to bypass Windows security restrictions and gain elevated privileges | 148 |
| Exploits a vulnerability in the polkit system to gain elevated privileges | 1,973 |
| A collection of scripts for aiding in privilege escalation on Linux systems | 485 |
| A simple and secure alternative to sudo and doas for running commands with elevated privileges. | 6 |
| An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| A collection of GCP IAM privilege escalation methods and their associated tools | 351 |
| A PowerShell module for demonstrating third-party privilege escalation attacks with Cobalt Strike's Beacon payload | 894 |
| Provides scripts and techniques to exploit vulnerabilities in Microsoft Exchange deployments on Active Directory | 737 |