OSCP-Priv-Esc
Mind maps / flow charts to help with privilege escalation on the OSCP. (by C0nd4)
pspy
Monitor linux processes without root permissions (by DominicBreuker)
OSCP-Priv-Esc | pspy | |
---|---|---|
3 | 8 | |
304 | 4,510 | |
- | - | |
10.0 | 0.0 | |
over 3 years ago | over 1 year ago | |
Go | ||
- | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
OSCP-Priv-Esc
Posts with mentions or reviews of OSCP-Priv-Esc.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-06-14.
-
Recommendations for linux and windows manual priv esc enumeration cheat sheets?
Win & Linux PE: https://github.com/C0nd4/OSCP-Priv-Esc
- I passed with 100 points on second attempt AMA
- a goldmine mind map for active directory
pspy
Posts with mentions or reviews of pspy.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-10-12.
-
Ask HN: What's the big deal with Go (Golang)?
* https://github.com/DominicBreuker/pspy
When you deploy them they just work. Compare that to compiled C++ code you often face issues with the deployment in my experience. And production machines usually do not ship compilers.
-
Need help getting rid of malware "perfcc / perfctl"
Configure auditd to log everything. Then use ausearch and aureport to inspect the events. You could also configure rsyslog to send the logs to a remote grafana server. There're a lot of tools you could use: falco, tracee, osquery, go-auditd+elastic, pspy , ...
-
LinPEAS
Literally using this right now on a pentest looking for privesc in some Linux boxes - the great thing about this tool is it's a shell script that's portable and does a significant amount of enumeration - big time saver. Feel as if it's better then the most others out there.
The second go-to tool after Linpeas is pspy which "allows you to see commands run by other users, cron jobs, etc. as they execute" [1]
[1] https://github.com/DominicBreuker/pspy
-
Tips to improve speed during CTFs
skipping processes (use tools such as pspy)
-
I passed with 100 points on second attempt AMA
I also forgot https://github.com/DominicBreuker/pspy obviously for linux privesc
-
What are some underrated (legal) tools that you have used during the OSCP that no one talks about or knows?
![pspy](https://github.com/DominicBreuker/pspy)
-
Startup CTF room, priv esc
It’s not in crontab either. You need to use a tool like pspy to find it.
-
alpha-sudo - my first emacs package
All you need to do is run a tool like ps or top often enough and eventually you'll catch a short-lived process exposing sensitive data in its command line. In fact, people wrote specialized scripts doing that at fast enough speed to catch them: https://github.com/DominicBreuker/pspy
What are some alternatives?
When comparing OSCP-Priv-Esc and pspy you can also consider the following projects:
AutoRecon - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)