carlospolop/privilege-escalation-awesome-scripts-suite is an open source project licensed under MIT License which is an OSI approved license.
Similar projects and alternatives to privilege-escalation-awesome-scripts-suite based on common topics and language
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins :arrow_up: :skull_and_crossbones:
Scout APM - Leading-edge performance monitoring starting at $39/month. Scout APM uses tracing logic that ties bottlenecks to source code so you know the exact line of code causing performance issues and can get back to building a great product faster.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
IPBan Monitors failed logins and bad behavior and bans ip addresses on Windows and Linux. Highly configurable, lean and powerful. Learn more at ↓
All the characters that work on most terminals
PowerShell for every system!
Best OSCP resources/cheat sheets/webpages/references Post them here
reddit.com/r/oscp | 2021-04-14
A black-box penetration test (coursework) - please help me
reddit.com/r/Pentesting | 2021-04-11
https://book.hacktricks.xyz/ - go through methods listed there for each port
Best Learning Material for OSCP?
reddit.com/r/oscp | 2021-04-06
Best learning material is very subjective, one man's meat is another man's poison, I felt the more practice with lab machines the more experience gained. I recommend when doing lab machines use https://book.hacktricks.xyz/, https://github.com/swisskyrepo/PayloadsAllTheThings, https://gtfobins.github.io/, https://lolbas-project.github.io/# as the base materials, then next thing is learn how to use searchsploit, and use correct keywords to find the things you need from google.
Where can I get the list of all possible attacks?
reddit.com/r/oscp | 2021-03-29
https://book.hacktricks.xyz/ this one is my favorite, there is a page with common attacks / useful commands for every common port.
PAM for SSH - /etc/pam.d/sshd
reddit.com/r/linux4noobs | 2021-03-27
I've recently run the linpeas script, which I've been told should highlight any security issues on my Linux box. Though nothing of significance has shown up, I've seen it's flagged a few auth lines in my /etc/pam.d/sshd file.
How to do a Checkup on Linux
reddit.com/r/LinuxOverdose | 2021-03-26
Passed my OSCP; story and hot take below
reddit.com/r/oscp | 2021-03-25
I used this website for general reading: https://book.hacktricks.xyz/
Traitor: Linux privilege escalation made easy
reddit.com/r/linux | 2021-02-26
How does this really differ from linpeas (Linpeas Github) or unixprivchecker (unixprivchecker Github)? The readme is saying the script stops if it ever gets root, but what about other vulnerabilities that may exist simultaneously? While no script can do everything, does it account for the different branches SUID / SGID exploits can take ( vi | GTFOBins)?news.ycombinator.com | 2021-02-22
Seems interesting with the Docker exploit I guess. I would still recommend linpeas: https://github.com/carlospolop/privilege-escalation-awesome-...
Privilege escalation problem
reddit.com/r/oscp | 2020-12-22
Check out https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite and the accompanying “book” at https://book.hacktricks.xyz/