The Wayback Machine - https://web.archive.org/web/20221006112516/https://github.com/topics/privilege-escalation-exploits
#
privilege-escalation-exploits
Here are
32 public repositories
matching this topic...
Linux privilege escalation auditing tool
-
Updated
Oct 4, 2022
-
Shell
Collection of things made during my OSCP journey
-
Updated
Feb 24, 2022
-
Python
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
-
Updated
Aug 14, 2022
-
Shell
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
-
Updated
Nov 23, 2021
-
PowerShell
Bypass UAC by hijacking a DLL located in the Native Image Cache
Linux Privilege Escalation Tool By WazeHell
-
Updated
Apr 12, 2019
-
Shell
Bypass UAC by abusing the Internet Explorer Add-on installer
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
Brahma - Privilege elevation exploit for Nintendo 3DS
The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
AppXSVC Service race condition - privilege escalation
Bypass UAC at any level by abusing the Task Scheduler and environment variables
x64 Windows privilege elevation using anycall
-
Updated
Apr 28, 2021
-
Shell
Privilege escalation in Docker
-
Updated
Jun 30, 2022
-
Shell
Bypass UAC by abusing shell protocol handlers
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Improve this page
Add a description, image, and links to the
privilege-escalation-exploits
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
privilege-escalation-exploits
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.