lpeworkshop
Privilege Escalation Workshop
A workshop providing a comprehensive guide to local privilege escalation on Linux and Windows operating systems.
Windows / Linux Local Privilege Escalation Workshop
2k stars
62 watching
466 forks
Language: Batchfile
last commit: over 2 years ago
Linked from 3 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
| A comprehensive resource providing techniques and tools for elevating privileges on Windows systems through misconfigurations and vulnerabilities | 998 |
| A proof-of-concept demonstrating local privilege escalation in a specific vulnerability | 1,060 |
| A collection of scripts for aiding in privilege escalation on Linux systems | 485 |
| A tool that exploits vulnerabilities in Kerberos authentication to bypass local privilege restrictions on Windows domain environments. | 1,544 |
| Provides tools and techniques for exploiting Windows privilege escalation vulnerabilities from service accounts to SYSTEM. | 1,638 |
| A toolset to exploit a Windows vulnerability allowing an attacker to gain elevated privileges on the local system by using NTLM authentication over HTTP. | 394 |
| A collection of GCP IAM privilege escalation methods and their associated tools | 351 |
| Tools for exploiting privilege escalation vulnerabilities on z/OS systems | 79 |
| A simple and secure alternative to sudo and doas for running commands with elevated privileges. | 6 |
| A tool for identifying potential vulnerability points in Linux systems | 1,590 |
| Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 |
| A PowerShell module for demonstrating third-party privilege escalation attacks with Cobalt Strike's Beacon payload | 894 |
| A tool designed to enumerate local administrative privileges on Windows systems using various protocols | 83 |
| Provides scripts and techniques to exploit vulnerabilities in Microsoft Exchange deployments on Active Directory | 737 |
| A tool that identifies privilege escalation paths in cloud and saas applications by analyzing permissions across multiple platforms. | 673 |