From 595abb86201daa15f271ebb57f11fd1b0aefd243 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Thu, 23 Jul 2020 17:04:30 +0700 Subject: [PATCH] Add: hlldz/dazzleUP --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 73c2c49..cf688b7 100644 --- a/README.md +++ b/README.md @@ -1817,6 +1817,10 @@ This repository is created as an online bookmark for useful links, resources and google/sandbox-attacksurface-analysis-tools This is a small suite of tools to test various properties of sandboxes on Windows. Many of the checking tools take a -p flag which is used to specify the PID of a sandboxed process. The tool will impersonate the token of that process and determine what access is allowed from that location. Also it's recommended to run these tools as an administrator or local system to ensure the system can be appropriately enumerated. + + hlldz/dazzleUP + A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. + hlldz/Invoke-Phant0m Windows Event Log Killer