This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.
-
Updated
Jan 28, 2023 - Python
This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.
Introduction to Computer Security with Kali Linux
All About Penetration test
Bits and pieces from my personal notes and scripts
this project is for learning privilege escalation and open forward
Koadic C3 COM Command & Control - JScript RAT
[Feature complete] Authenticate with keyfile and run a process as root
The second in a series of four machines, each pen-tested and explained.
Visualize Oracle DB user permissions with a network graph in the browser
It will show all the binaries on your system from the GTFOBins that can cause Privilege Escalation on your system.
Exploits and reports for CVE-2023-32162
CVE-2021-4034 pkexec - Linux Local Privilege Escalation
This repository describes how to exploit the Bash Shellshock vulnerability.
My write up for the recently retired HackTheBox machine: Wall!
Proof of concept for different Windows vulnerabilities
GTFOBins Search is a command-line tool that allows you to easily search GTFOBins for privilege escalation and bypass techniques using various Unix-like binaries
Auto Root / Privilege Escalation Exploit
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."