From ea8dbed999a1684c10bb62ed4e43d3292cb91a4f Mon Sep 17 00:00:00 2001 From: Victor Ramos Mello <772792+m0nad@users.noreply.github.com> Date: Fri, 13 Dec 2019 14:36:51 +0100 Subject: [PATCH] Title in "Tools" section from "Linux" Title and descriptions in "Tools" sections plus moving misplaced ones and removing broken links --- README.md | 42 +++++++++++++++++++++--------------------- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git a/README.md b/README.md index adda843..e46ba77 100644 --- a/README.md +++ b/README.md @@ -49,6 +49,7 @@ old-school Unix hacking technique, that will still work in 2013. - [Linux - Privilege Escalation](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md) - [Privilege escalation: Linux](https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux) - [Penetration-Testing-Grimoire/Privilege Escalation/linux.md](https://github.com/weaknetlabs/Penetration-Testing-Grimoire/blob/master/Privilege%20Escalation/linux.md) + - [Privilege Escalation Cheatsheet (Vulnhub)](https://github.com/Ignitetechnologies/Privilege-Escalation): This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples. - [Hackers Hut](https://www.win.tue.nl/~aeb/linux/hh/hh.html): Some random hacking hints, mainly from a Linux point of view. - [Hacking Linux Part I: Privilege Escalation](http://www.dankalia.com/tutor/01005/0100501004.htm) @@ -75,27 +76,26 @@ old-school Unix hacking technique, that will still work in 2013. - [An Interesting Privilege Escalation vector (getcap/setcap)](https://nxnjz.net/2018/08/an-interesting-privilege-escalation-vector-getcap/) ### Tools - - https://github.com/rebootuser/LinEnum - - http://pentestmonkey.net/tools/audit/unix-privesc-check - - https://github.com/mzet-/linux-exploit-suggester - - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester - - https://github.com/jondonas/linux-exploit-suggester-2 - - https://github.com/sleventyeleven/linuxprivchecker - - https://github.com/belane/linux-soft-exploit-suggester - - https://github.com/pentestmonkey/exploit-suggester - - https://github.com/AlessandroZ/BeRoot - - https://github.com/spencerdodd/kernelpop - - https://github.com/ngalongc/AutoLocalPrivilegeEscalation - - https://github.com/linted/linuxprivchecker - - https://github.com/initstring/uptux - - https://github.com/Ignitetechnologies/Privilege-Escalation - - https://github.com/AusJock/Privilege-Escalation - - https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack - - https://github.com/ngalongc/AutoLocalPrivilegeEscalation - - https://github.com/1N3/PrivEsc - - https://github.com/diego-treitos/linux-smart-enumeration - - https://github.com/pentestmonkey/unix-privesc-check - - https://github.com/SecWiki/linux-kernel-exploits + - [LinEnum](https://github.com/rebootuser/LinEnum) + - [LES](https://github.com/mzet-/linux-exploit-suggester): LES: Linux privilege escalation auditing tool + - [Linux_Exploit_Suggester](https://github.com/InteliSecureLabs/Linux_Exploit_Suggester): Linux Exploit Suggester; based on operating system release number. + - [Linux Exploit Suggester 2](https://github.com/jondonas/linux-exploit-suggester-2): Next-generation exploit suggester based on Linux_Exploit_Suggester + - [linuxprivchecker.py](https://github.com/sleventyeleven/linuxprivchecker): Linux Privilege Escalation Check Script + - [linux-soft-exploit-suggester](https://github.com/belane/linux-soft-exploit-suggester): linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. + - [exploit-suggester](https://github.com/pentestmonkey/exploit-suggester): This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. + - [unix-privesc-check](https://github.com/pentestmonkey/unix-privesc-check): Shell script to check for simple privilege escalation vectors on Unix systems + - [BeRoot](https://github.com/AlessandroZ/BeRoot): BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege. + - [kernelpop](https://github.com/spencerdodd/kernelpop): kernelpop is a framework for performing automated kernel vulnerability enumeration and exploitation. + - [AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation): An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically. + - [Linux Privilege Escalation Check Script](https://github.com/linted/linuxprivchecker): Originally forked from the linuxprivchecker.py (Mike Czumak), this script +is intended to be executed locally on a Linux box to enumerate basic system info and search for common privilege escalation vectors such as word writable files, misconfigurations, clear-text password and applicable +exploits. + - [uptux](https://github.com/initstring/uptux): Specialized privilege escalation checks for Linux systems. + - [Unix-Privilege-Escalation-Exploits-Pack](https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack): Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc. + - [AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation): An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically + - [PrivEsc](https://github.com/1N3/PrivEsc): A collection of Windows, Linux and MySQL privilege escalation scripts and exploits. + - [linux-smart-enumeration](https://github.com/diego-treitos/linux-smart-enumeration): Linux enumeration tools for pentesting and CTFs + - [linux-kernel-exploits](https://github.com/SecWiki/linux-kernel-exploits) #### Find CVEs - https://github.com/lwindolf/lpvs