๐Ÿ‘พ
ctrl-z
  • ๐Ÿ‘‹Welcome to ctrl-z
  • Cheat Sheets
    • Helpful Command QR
    • Footprinting
    • Information Gathering
    • File Transfers
    • LFI
    • MetaSploit
      • Using msfconsole
      • Creating Metasploit Payloads
    • Shells
      • Shells and Payloads
      • Shell Cheatsheet
    • Password Attacks
    • Attacking Common Services
    • Pivoting & Port Forwarding
    • Web Attacks
      • SQL
        • MySQL & SQLi
        • SQLmap
      • Fuzzing w FFUF
      • Bruteforce w Hydra
      • XSS
    • Active Directory
      • Intro to AD
      • AD Enum&Attack
      • RPC-Client
      • ๐Ÿฅmimikatz
      • NTLM Relay Attacks
    • ๐Ÿ’ขBuffer Overflow
    • Priv Esc
      • Linux Priv Esc
      • Windows Priv Esc
        • mimikatz
  • Tools
    • Containers
      • Kubernetes
      • Container Testing Methodology
      • Dropping Kali in your test space
    • Cloud
      • aws cli
    • Command Line
      • Linux Basic CML
      • Windows CML
      • Mac CML
    • Redteam & C2
      • Covenant C2
    • JS Deobuscation
    • Crackmapexec
  • Scripts
    • Priv Esc
  • Loot
  • Write Ups
    • Inject (active at the time)
Powered by GitBook
On this page
  1. Scripts

Priv Esc

PreviousCrackmapexecNextLoot

Last updated 1 year ago

PEASS-ng/linPEAS at master ยท carlospolop/PEASS-ngGitHub
Linux, Windows, and Mac Priv Esc and Enumeration scripts.
GitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation ChecksGitHub
LinEnum
GitHub - DominicBreuker/pspy: Monitor linux processes without root permissionsGitHub
pspy
809KB
linpeas.sh
Logo
Logo
Logo