Awesome
<div align="center"> <h2 align="center"><a href="https://github.com/Anlominus">⚜️ Aภl๏miuภuຮ ⚜️</a></h2> <img align="center" width="100" src="https://user-images.githubusercontent.com/51442719/172729066-1293d382-4a31-4f03-8c23-ab0ea5f611a0.png">בס״ד
⫷ HacKingPro
⫸
<br>
⫷ TryHackMe
| KoTH
⫸
<br>
⫷ Privilege-Escalation
⫸
<br>
⫷ ScanPro
| Linfo
| Diablo
⫸
<br>
⫷ Offensive-Security
| PenTest
⫸
<br>
⫷ Goals
| Studies
| HacKing
| AnyTeam
⫸
<br>
<div align="center">
Privilege-Escalation
Linux-PrivEsc
| Windows-PrivEsc
Tools
| Cheat Sheets
| Notes
| Checklists
Privilege Escalation Vectors
- Following information are considered as critical Information of Linux System:
- The version of the operating system
- Any Vulnerable package installed or running
- Files and Folders with Full Control or Modify Access
- Mapped Drives
- Potentially Interesting Files
- Network Information (interfaces, arp)
- Firewall Status and Rules
- Running Processes
- Stored Credentials
- Sudo Rights
- Path Variables
- Docker
- Buffer Overflow conditions
- Cronjobs
- Capabilities
GiTools
-
Lynis - Security auditing and hardening tool, for UNIX-based systems.
-
This contains common local exploits and enumeration scripts
Other Sources
- https://hacktoday.io/tag/privilege-escalation
- PEASS-ng
- LinEnum
- Bashark 2.0
- LES: Linux Exploit Suggester
- Linuxprivchecker
- Linux Smart Enumeration
<h2 align="center"> </h2>