Explore 23 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
A list of Windows privilege escalation techniques, categorized and explained in detail.
A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.
A collection of precompiled Windows exploits for privilege escalation.
Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.
A Linux-based environment for penetration testing and vulnerability exploitation
A script that implements Cognito attacks such as Account Oracle or Priviledge Escalation
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.
Abusing DNSAdmins privilege for escalation in Active Directory
A workshop offering resources for local privilege escalation on Windows and Linux systems.
Full-featured C2 framework for stealthy communication and control on web servers.
Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.