mirror of
https://github.com/m0nad/awesome-privilege-escalation.git
synced 2024-12-22 05:44:59 -05:00
Add description for PayloadsAllTheThings methodology
This commit is contained in:
parent
70d7c01dee
commit
08381ea099
@ -36,7 +36,7 @@ A curated list of awesome privilege escalation
|
||||
- [Hacking Linux Part I: Privilege Escalation](http://www.dankalia.com/tutor/01005/0100501004.htm)
|
||||
- [How privileges work in operating systems?](https://www.future-processing.pl/blog/privilege-escalation/)
|
||||
- [Linux elevation of privileges ToC](https://guif.re/linuxeop)
|
||||
- [Linux - Privilege Escalation](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md)
|
||||
- [Linux - Privilege Escalation](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md): Methodology from PayloadsAllTheThings
|
||||
- [Linux Privilege Escalation](https://percussiveelbow.github.io/linux-privesc/): an introduction to Linux escalation techniques, mainly focusing on file/process permissions, but along with some other stuff too.
|
||||
- [Linux Privilege Escalation](https://book.hacktricks.xyz/linux-unix/privilege-escalation): by HackTricks
|
||||
- [Linux Privilege Escalation via Dynamically Linked Shared Object Library](https://www.contextis.com/en/blog/linux-privilege-escalation-via-dynamically-linked-shared-object-library): How RPATH and Weak File Permissions can lead to a system compromise.
|
||||
|
Loading…
Reference in New Issue
Block a user