Operating Systems for Embedded Systems A.Y. 2022/23 group project: a Privilege Escalation demonstration exploiting Buffer Overflow.
-
Updated
Dec 16, 2023 - C
Operating Systems for Embedded Systems A.Y. 2022/23 group project: a Privilege Escalation demonstration exploiting Buffer Overflow.
[Feature complete] Authenticate with keyfile and run a process as root
The second in a series of four machines, each pen-tested and explained.
👻 SYSTEMatic: Systematically Seizing SYSTEM Rights. Token Impersonation POC. Alternative to PSExec for token theft. From Administrator to NT Authority\SYSTEM.
[Feature complete] A simpler alternative to sudo and doas
[Feature complete] Edit a file that requires root access
42 | Privilege escalation exercices on a system image
PrivEsc using Process Token Impersonation - Search all Processes
42 | Privilege escalation exercices on a system image
snow crash is an introduction to cybersecurity CTF like on a virtual machine
CVE-2021-4034 pkexec - Linux Local Privilege Escalation
The fourth in a series of four machines, each pen-tested and explained.
Proof-of-Concept of the ZombieLoad-Attack for a demonstration on Intel's i7-7700k using Windows 10 Pro
A Windows reverse shell written in C. Supports both cmd and PS and can automatically reconnect to the host
Linux Kernel 2.4.22 kernel Buffer overflow vulnerabilities and exploit
Small and simple tool for privilege escalation
All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs
Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.
ESTHER's a native enumeration tool for GNU/Linux Privilege Escalation
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."