Koadic C3 COM Command & Control - JScript RAT
-
Updated
Oct 30, 2018 - Python
Koadic C3 COM Command & Control - JScript RAT
Linux privilege escalation exploit via snapd (CVE-2019-7304)
Privilege escalation tool sets on Windows.
Linux privilege escalation checks (systemd, dbus, socket fun, etc)
It will show all the binaries on your system from the GTFOBins that can cause Privilege Escalation on your system.
CVE-2020-0796 Local Privilege Escalation POC
linuxprivchecker.py -- a Linux Privilege Escalation Check Script (updated for use with Python 3!)
Integrated Detection Framework for Android's Privilege Escalation Vulnerabilites
Terribad PrivEsc enumeration script for Windows systems
Search for Unix binaries that can be exploited to bypass system security restrictions.
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
a simple script to spawn a new process with another high privilege token from hoked process. based on Windows APIs.
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
- Repository for you to be happy! 🤓
This project is exploit for some docker containers with similar to vulnerability code: CVE-2020-35191
Python AV Evasion Tools
Collection of things made during my OSCP journey
Windows // Privilege Escalation
Privilege Escalation Scan Tool and Guide how to hardening and exploit the vulnerability
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."