mirror of
https://github.com/m0nad/awesome-privilege-escalation.git
synced 2024-12-22 13:55:02 -05:00
Title in "Tools" section from "Linux"
Title and descriptions in "Tools" sections plus moving misplaced ones and removing broken links
This commit is contained in:
parent
1c417a7978
commit
ea8dbed999
42
README.md
42
README.md
@ -49,6 +49,7 @@ old-school Unix hacking technique, that will still work in 2013.
|
||||
- [Linux - Privilege Escalation](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md)
|
||||
- [Privilege escalation: Linux](https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux)
|
||||
- [Penetration-Testing-Grimoire/Privilege Escalation/linux.md](https://github.com/weaknetlabs/Penetration-Testing-Grimoire/blob/master/Privilege%20Escalation/linux.md)
|
||||
- [Privilege Escalation Cheatsheet (Vulnhub)](https://github.com/Ignitetechnologies/Privilege-Escalation): This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
|
||||
- [Hackers Hut](https://www.win.tue.nl/~aeb/linux/hh/hh.html): Some random hacking hints, mainly from a Linux point of view.
|
||||
- [Hacking Linux Part I: Privilege Escalation](http://www.dankalia.com/tutor/01005/0100501004.htm)
|
||||
|
||||
@ -75,27 +76,26 @@ old-school Unix hacking technique, that will still work in 2013.
|
||||
- [An Interesting Privilege Escalation vector (getcap/setcap)](https://nxnjz.net/2018/08/an-interesting-privilege-escalation-vector-getcap/)
|
||||
|
||||
### Tools
|
||||
- https://github.com/rebootuser/LinEnum
|
||||
- http://pentestmonkey.net/tools/audit/unix-privesc-check
|
||||
- https://github.com/mzet-/linux-exploit-suggester
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/jondonas/linux-exploit-suggester-2
|
||||
- https://github.com/sleventyeleven/linuxprivchecker
|
||||
- https://github.com/belane/linux-soft-exploit-suggester
|
||||
- https://github.com/pentestmonkey/exploit-suggester
|
||||
- https://github.com/AlessandroZ/BeRoot
|
||||
- https://github.com/spencerdodd/kernelpop
|
||||
- https://github.com/ngalongc/AutoLocalPrivilegeEscalation
|
||||
- https://github.com/linted/linuxprivchecker
|
||||
- https://github.com/initstring/uptux
|
||||
- https://github.com/Ignitetechnologies/Privilege-Escalation
|
||||
- https://github.com/AusJock/Privilege-Escalation
|
||||
- https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack
|
||||
- https://github.com/ngalongc/AutoLocalPrivilegeEscalation
|
||||
- https://github.com/1N3/PrivEsc
|
||||
- https://github.com/diego-treitos/linux-smart-enumeration
|
||||
- https://github.com/pentestmonkey/unix-privesc-check
|
||||
- https://github.com/SecWiki/linux-kernel-exploits
|
||||
- [LinEnum](https://github.com/rebootuser/LinEnum)
|
||||
- [LES](https://github.com/mzet-/linux-exploit-suggester): LES: Linux privilege escalation auditing tool
|
||||
- [Linux_Exploit_Suggester](https://github.com/InteliSecureLabs/Linux_Exploit_Suggester): Linux Exploit Suggester; based on operating system release number.
|
||||
- [Linux Exploit Suggester 2](https://github.com/jondonas/linux-exploit-suggester-2): Next-generation exploit suggester based on Linux_Exploit_Suggester
|
||||
- [linuxprivchecker.py](https://github.com/sleventyeleven/linuxprivchecker): Linux Privilege Escalation Check Script
|
||||
- [linux-soft-exploit-suggester](https://github.com/belane/linux-soft-exploit-suggester): linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation.
|
||||
- [exploit-suggester](https://github.com/pentestmonkey/exploit-suggester): This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try.
|
||||
- [unix-privesc-check](https://github.com/pentestmonkey/unix-privesc-check): Shell script to check for simple privilege escalation vectors on Unix systems
|
||||
- [BeRoot](https://github.com/AlessandroZ/BeRoot): BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.
|
||||
- [kernelpop](https://github.com/spencerdodd/kernelpop): kernelpop is a framework for performing automated kernel vulnerability enumeration and exploitation.
|
||||
- [AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation): An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically.
|
||||
- [Linux Privilege Escalation Check Script](https://github.com/linted/linuxprivchecker): Originally forked from the linuxprivchecker.py (Mike Czumak), this script
|
||||
is intended to be executed locally on a Linux box to enumerate basic system info and search for common privilege escalation vectors such as word writable files, misconfigurations, clear-text password and applicable
|
||||
exploits.
|
||||
- [uptux](https://github.com/initstring/uptux): Specialized privilege escalation checks for Linux systems.
|
||||
- [Unix-Privilege-Escalation-Exploits-Pack](https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack): Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.
|
||||
- [AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation): An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically
|
||||
- [PrivEsc](https://github.com/1N3/PrivEsc): A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
|
||||
- [linux-smart-enumeration](https://github.com/diego-treitos/linux-smart-enumeration): Linux enumeration tools for pentesting and CTFs
|
||||
- [linux-kernel-exploits](https://github.com/SecWiki/linux-kernel-exploits)
|
||||
|
||||
#### Find CVEs
|
||||
- https://github.com/lwindolf/lpvs
|
||||
|
Loading…
Reference in New Issue
Block a user