Linux post exploitation privilege escalation enumeration
-
Updated
Aug 20, 2020 - C
Linux post exploitation privilege escalation enumeration
WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift
Lemon is a User Interactive bash program to search for privilege escalation vectors on Linux in an automated fashion
AfterLogic Products Vulnerabilities
This script search for the bin on the https://gtfobins.github.io/ for the SUID exploit and returns the bins that have exploit available on gtfobins. So you don't need to manually search for every file on the site.
Hands-on exploitation of the VSFTPD 2.3.4 backdoor vulnerability using Metasploit to gain shell access, create users, modify logs, and attempt privilege escalation in a secure lab environment.
Beewolf is a PowerShell script that exploits HiveNightmare/SeriousSAM
Basic linux enum script
Hands-on exploitation of the VSFTPD 2.3.4 backdoor vulnerability using Metasploit to gain shell access, create users, modify logs, and attempt privilege escalation in a secure lab environment.
Add a description, image, and links to the privilage-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilage-escalation topic, visit your repo's landing page and select "manage topics."