Loading...
Browse 49 privilege escalation tools
Red team penetration testing services simulating real-world attacks
Red team penetration testing services simulating real-world attacks
ITDR solution that monitors authentication events and identity behavior
ITDR solution that monitors authentication events and identity behavior
PAM solution for controlling, auditing, and protecting privileged accounts
PAM solution for controlling, auditing, and protecting privileged accounts
Tier 0 attack path discovery tool for Active Directory and Entra ID
Tier 0 attack path discovery tool for Active Directory and Entra ID
GenAI-powered identity security platform for least privilege access management
GenAI-powered identity security platform for least privilege access management
Cloud identity entitlement mgmt. for right-sizing perms & detecting compromise
Cloud identity entitlement mgmt. for right-sizing perms & detecting compromise
Provides visibility into all identities and access across hybrid environments.
Provides visibility into all identities and access across hybrid environments.
AI agent security platform for discovery, risk assessment, and access control
AI agent security platform for discovery, risk assessment, and access control
Access intelligence platform for mapping access paths and enforcing least privilege
Access intelligence platform for mapping access paths and enforcing least privilege
Privileged access security platform for discovery, classification & protection
Privileged access security platform for discovery, classification & protection
Discovers, monitors, and enforces access policies for non-human identities.
Discovers, monitors, and enforces access policies for non-human identities.
Exposure validation platform combining BAS and attack path validation (CART)
Exposure validation platform combining BAS and attack path validation (CART)
Identity threat detection and response platform for hybrid environments
Identity threat detection and response platform for hybrid environments
Detects & blocks identity-based threats in real-time across hybrid environments
Detects & blocks identity-based threats in real-time across hybrid environments
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.
A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.
Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.
Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.
CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.
CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.
An educational cheatsheet that provides privilege escalation fundamentals and examples for CTF players and cybersecurity beginners.
An educational cheatsheet that provides privilege escalation fundamentals and examples for CTF players and cybersecurity beginners.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A script to enumerate Google Storage buckets and determine access and privilege escalation
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance