| quentinhardy/odat |
1,405 |
|
0 |
0 |
over 2 years ago |
0 |
|
10 |
|
Python |
| ODAT: Oracle Database Attacking Tool |
| ohpe/juicy-potato |
1,268 |
|
0 |
0 |
about 5 years ago |
0 |
|
8 |
gpl-3.0 |
C++ |
| A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM. |
| m0nad/awesome-privilege-escalation |
1,052 |
|
0 |
0 |
over 2 years ago |
0 |
|
2 |
|
|
| A curated list of awesome privilege escalation |
| b3rito/yodo |
199 |
|
0 |
0 |
about 9 years ago |
0 |
|
0 |
gpl-3.0 |
Shell |
| Local Privilege Escalation |
| milo2012/portia |
152 |
|
0 |
0 |
over 8 years ago |
0 |
|
4 |
|
PowerShell |
| Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network |
| bluefrostsecurity/CVE-2019-1215 |
123 |
|
0 |
0 |
over 6 years ago |
0 |
|
1 |
|
C++ |
| graniet/Inspector |
120 |
|
0 |
0 |
over 7 years ago |
0 |
|
0 |
|
Python |
| The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, check kernel version, check history file, get possible exploit ... |
| quentinhardy/pytmipe |
115 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
|
Python |
| Python library and client for token manipulations and impersonations for privilege escalation on Windows |
| Battelle/sinkhole |
27 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
bsd-3-clause |
Assembly |
| Architectural privilege escalation on x86 |
| bb107/WinSudo |
22 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
mit |
C++ |
| Execute commands as local system. |