uptux: Privilege escalation checks for Linux systemd
uptux Privilege escalation checks for Linux systemd. This tool checks for issues on Linux systems that may lead to privilege escalation. The core focus in on systemd configuration. This tool...
uptux Privilege escalation checks for Linux systemd. This tool checks for issues on Linux systems that may lead to privilege escalation. The core focus in on systemd configuration. This tool...
Network PenTest / Post Exploitation
by do son · Published March 3, 2019 · Last modified November 4, 2024
portia Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised Privilege escalation Lateral movement Convenience modules...
Exploitation / Post Exploitation / Vulnerability Analysis
by do son · Published December 17, 2018 · Last modified November 4, 2024
kernelpop kernelpop is a framework for performing automated kernel vulnerability enumeration and exploitation on the following operating systems: Linux Mac It is designed to be python version-agnostic, meaning that it should work...
Network PenTest / Post Exploitation / Vulnerability Analysis
by do son · Published September 20, 2018 · Last modified November 4, 2024
MIDA-Multitool – Bash script purposed for system enumeration, vulnerability identification, and privilege escalation.MIDA Multitool draws functionality from several of my previous scripts namely SysEnum and RootHelper and is in many regards RootHelpers successor. Besides functionality...
Information Gathering / Network PenTest / Post Exploitation
by do son · Published December 5, 2017 · Last modified November 4, 2024
JAWS is PowerShell script designed to help penetration testers (and CTFers) quickly identify potential privilege escalation vectors on Windows systems. It is written using PowerShell 2.0 so ‘should’ run on...
RottenPotato – Local Privilege Escalation from Windows Service Accounts to SYSTEM The idea behind this vulnerability is simple to describe at a high level: Trick the “NT AUTHORITY\SYSTEM” account into...
Network PenTest / Post Exploitation
by do son · Published April 24, 2017 · Last modified November 4, 2024
How Potato works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS...