776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
20 results tagged privesc x
  • thumbnail
    Markakd/CVE-2022-2588: exploit for CVE-2022-2588
    September 20, 2022 at 11:15:38 PM UTC * - permalink -
    QRCode
    - https://github.com/Markakd/CVE-2022-2588
    lpe privesc linux
  • Guide - Vulnerable Kernel Drivers For Exploitation
    April 14, 2022 at 3:50:55 PM UTC * - permalink -
    QRCode
    - https://guidedhacking.com/threads/vulnerable-kernel-drivers-for-exploitation.15979/
    kernel driver exploitation windows privesc
  • hfiref0x/KDU - githubhot
    April 14, 2022 at 3:50:43 PM UTC * - permalink -
    QRCode
    - https://githubhot.com/repo/hfiref0x/KDU
    kernel driver exploitation windows privesc
  • Note: Setup vuln alwaysinstallelevated

    $RegistryPath1 = 'HKCU:\Software\Policies\Microsoft\Windows\Installer'
    $RegistryPath2 = 'HKLM:\Software\Policies\Microsoft\Windows\Installer'
    $Name = 'AlwaysInstallElevated'
    $Value = '1'

    Create the key if it does not exist

    New-Item -Path $RegistryPath1 -Force | Out-Null
    New-Item -Path $RegistryPath2 -Force | Out-Null

    Now set the value

    New-ItemProperty -Path $RegistryPath1 -Name $Name -Value $Value -PropertyType DWORD -Force
    New-ItemProperty -Path $RegistryPath2 -Name $Name -Value $Value -PropertyType DWORD -Force

    April 2, 2022 at 9:44:06 PM UTC - permalink -
    QRCode
    - https://shaarli.onemask.me/?-WEM-A
    alwaysinstallelevated msi windows privesc powershell
  • The Java Soothsayer: A practical application for insecure randomness. (Includes free 0day)
    July 13, 2021 at 11:16:14 AM UTC * - permalink -
    QRCode
    - https://web.archive.org/web/20180315203404/https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd
    randomstringutils java password reset admin privesc
  • PsExec Local Privilege Escalation | by David Wells | Tenable TechBlog | Dec, 2020 | Medium
    December 11, 2020 at 9:43:45 AM UTC * - permalink -
    QRCode
    - https://medium.com/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8
    psexec privesc
  • thumbnail
    Abusing SeLoadDriverPrivilege for privilege escalation - Tarlogic Security - Cyber Security and Ethical hacking
    September 2, 2020 at 5:25:50 PM UTC * - permalink -
    QRCode
    - https://www.tarlogic.com/en/blog/abusing-seloaddriverprivilege-for-privilege-escalation/
    seloaddriverprivilege driver privesc windows load kernel process token
  • thumbnail
    itm4n/PrivescCheck: Privilege Escalation Enumeration Script for Windows
    June 4, 2020 at 10:47:19 PM UTC * - permalink -
    QRCode
    - https://github.com/itm4n/PrivescCheck
    windows privesc script itm4n
  • itm4n/SysTracingPoc: CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability
    May 25, 2020 at 8:01:33 PM UTC * - permalink -
    QRCode
    - https://github.com/itm4n/SysTracingPoc
    windows lpe privilege escalation privesc tracing
  • GitHub - S3cur3Th1sSh1t/WinPwn: Automation for internal Windows Penetrationtest / AD-Security
    November 20, 2019 at 11:02:50 AM UTC * - permalink -
    QRCode
    - https://github.com/S3cur3Th1sSh1t/WinPwn
    windows privesc privilege escalation hacking pentest
  • thumbnail
    GitHub - rootm0s/WinPwnage: UAC bypass, Elevate, Persistence and Execution methods
    November 14, 2019 at 8:03:17 PM UTC * - permalink -
    QRCode
    - https://github.com/rootm0s/WinPwnage
    winprivesc privesc privilege escalation windows hacking pentest
  • “Relaying” Kerberos - Having fun with unconstrained delegation - dirkjanm.io
    November 12, 2019 at 10:00:36 AM UTC * - permalink -
    QRCode
    - https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/
    kerberos krbrelay krbrelaying tickets ptt hacking pentest unconstrained delegation privilege escalation privesc windows
  • thumbnail
    Windows Privilege Escalation via Unquoted Service Paths – root@Hausec
    November 12, 2019 at 9:52:54 AM UTC * - permalink -
    QRCode
    - https://hausec.com/2018/10/05/windows-privilege-escalation-via-unquoted-service-paths/
    unquoted service paths active directory privilege escalation privesc ad enum windows hacking pentest
  • thumbnail
    GitHub - f0rb1dd3n/Reptile: LKM Linux rootkit
    October 19, 2019 at 10:52:44 AM UTC * - permalink -
    QRCode
    - https://github.com/f0rb1dd3n/Reptile
    rootkit bootkit linux privesc persistence hacking pentest phrack
  • thumbnail
    GitHub - d4rk007/RedGhost: Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
    October 19, 2019 at 10:31:17 AM UTC * - permalink -
    QRCode
    - https://github.com/d4rk007/RedGhost
    privesc persistence hacking toolkit rootkit redghost
  • thumbnail
    Recipe for Root - Your Cookbook for Privilege Escalation
    October 9, 2019 at 4:09:17 PM UTC * - permalink -
    QRCode
    - https://recipeforroot.com/
    privesc windows linux privilege escalation hacking pentest howto tuto
  • LOLBAS

    Lolbins -> Windows
    GTFOBin -> Linux (https://gtfobins.github.io/)

    August 1, 2019 at 2:55:00 PM UTC * - permalink -
    QRCode
    - https://lolbas-project.github.io/
    gtfobin gtfo lolbins privesc pe exploitation hacking pentest jailbreak
  • FuzzySecurity | Windows Privilege Escalation Fundamentals
    March 7, 2019 at 7:16:45 PM UTC * - permalink -
    QRCode
    - https://www.fuzzysecurity.com/tutorials/16.html
    windows hacking post exploitation postex privesc privilege escalation fuzzy cheatsheet
  • A Virgil's Guide to Pentest: Escalation Time
    February 6, 2019 at 10:44:33 AM UTC * - permalink -
    QRCode
    - https://virgil-cj.blogspot.com/2018/02/escalation-time.html
    privesc windows hacking pentest
  • 31 days of OSCP Experience - ScriptDotSh

    Post Exploit Enumeration :

    grep -rnw '/' -ie 'pass' --color=always
    grep -rnw '/' -ie 'DB_PASS' --color=always
    grep -rnw '/' -ie 'DB_PASSWORD' --color=always
    grep -rnw '/' -ie 'DB_USER' --color=always

    File uplaod through B64

    PSexec Shells of Remote Systems

    .\psexec64.exe \\192.168.x.x -u .\administrator -p admin@123 cmd.exe

    Disabling firewall/defender and enabling RDF for all

    sc stop WinDefend
    netsh advfirewall show allprofiles
    netsh advfirewall set allprofiles state off
    netsh firewall set opmode disable
    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f
    February 5, 2019 at 2:28:58 AM UTC * - permalink -
    QRCode
    - https://scriptdotsh.com/index.php/2018/04/17/31-days-of-oscp-experience/
    oscp resources materials hacking walkthrough guide privesc linux
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation