PrivescCheck
Priv2Admin
PrivescCheck | Priv2Admin | |
---|---|---|
4 | 7 | |
2,630 | 1,734 | |
- | - | |
8.4 | 1.2 | |
2 months ago | about 1 year ago | |
PowerShell | ||
BSD 3-clause "New" or "Revised" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PrivescCheck
- Windows scheduled task PE
-
Passed with 90 points (incl report)
You're welcome. This is it https://github.com/itm4n/PrivescCheck
-
Failed again, 2nd attempt..sadpanda
Run https://github.com/itm4n/PrivescCheck => Also dumps cleartext passwords if any are saved, great to run crackmapexec if no hash is available
- I passed with 100 points on second attempt AMA
Priv2Admin
- Passed with 90 points (incl report)
-
I passed with 100 points on second attempt AMA
things like checking whoami /priv + https://github.com/gtworek/Priv2Admin
- GitHub - gtworek/Priv2Admin: Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
- gtworek/Priv2Admin: Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS. Handy reference for technical defenders also.
- Token impersonations
What are some alternatives?
OSCP-Priv-Esc - Mind maps / flow charts to help with privilege escalation on the OSCP.
juicy-potato - A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Seatbelt - Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PrintSpoofer - Abusing impersonation privileges through the "Printer Bug"
OSCP-Bash-Scripts - Some handy bash scripts I used for the OSCP
pspy - Monitor linux processes without root permissions
OSCP-Exercise-Checklist - A checklist to help students track their OSCP exercise progress.
AutoRecon - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.