Explore 23 curated tools and resources
A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
A list of Windows privilege escalation techniques, categorized and explained in detail.
A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.
A collection of precompiled Windows exploits for privilege escalation.
Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.
A Linux-based environment for penetration testing and vulnerability exploitation
A script that implements Cognito attacks such as Account Oracle or Priviledge Escalation
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.
Abusing DNSAdmins privilege for escalation in Active Directory
A workshop offering resources for local privilege escalation on Windows and Linux systems.
Full-featured C2 framework for stealthy communication and control on web servers.
Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.