Windows-Local-Privilege-Escalation-Cookbook
Privilege Escalation Guide
A comprehensive resource providing techniques and tools for elevating privileges on Windows systems through misconfigurations and vulnerabilities
Windows Local Privilege Escalation Cookbook
981 stars
12 watching
155 forks
Language: PowerShell
last commit: 8 months ago administratoradministrator-privilegescheatsheetcmdcookbookeoplablab-automationlocal-administrationlocal-privilege-escalationlpemicrosoftmisconfigurationoscposcp-preposeposep-preppowershellprivilege-escalationwindows
Related projects:
Repository | Description | Stars |
---|---|---|
ccob/sweetpotato | Provides tools and techniques for exploiting Windows privilege escalation vulnerabilities from service accounts to SYSTEM. | 1,622 |
arthepsy/cve-2021-4034 | A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,056 |
sagishahar/lpeworkshop | A workshop providing a comprehensive guide to local privilege escalation on Linux and Windows operating systems. | 1,879 |
rvn0xsy/cve_2020_0796_cna | Represents a proof-of-concept for exploiting a vulnerability to gain privileged access on Windows 10 systems | 78 |
med0x2e/ntlmrelay2self | A toolset to exploit a Windows vulnerability allowing an attacker to gain elevated privileges on the local system by using NTLM authentication over HTTP. | 394 |
dec0ne/krbrelayup | A tool that exploits vulnerabilities in Kerberos authentication to bypass local privilege restrictions on Windows domain environments. | 1,529 |
ayoul3/privesc | Tools for exploiting privilege escalation vulnerabilities on z/OS systems | 79 |
mr-un1k0d3r/elevate-system-trusted-bof | Tool to bypass Windows security restrictions and gain elevated privileges | 146 |
berdav/cve-2021-4034 | Exploits a vulnerability in the polkit system to gain elevated privileges | 1,962 |
nullarray/roothelper | A collection of scripts for aiding in privilege escalation on Linux systems | 485 |
atalii/adage | A simple and secure alternative to sudo and doas for running commands with elevated privileges. | 6 |
octoberfest7/cve-2023-36874_bof | An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 201 |
rhinosecuritylabs/gcp-iam-privilege-escalation | A collection of GCP IAM privilege escalation methods and their associated tools | 343 |
rsmudge/elevatekit | A PowerShell module for demonstrating third-party privilege escalation attacks with Cobalt Strike's Beacon payload | 891 |
gdedrouas/exchange-ad-privesc | Provides scripts and techniques to exploit vulnerabilities in Microsoft Exchange deployments on Active Directory | 728 |