Swissky
|
b80b72d3a3
|
References updated for JWT, RMI, LDAP, LaTeX
|
2024-11-07 14:50:52 +01:00 |
|
Swissky
|
12c6531ad2
|
README - Update links to Internal All The Things
|
2024-01-12 16:18:36 +01:00 |
|
enaylal
|
4684fed4aa
|
add priv esc windows
|
2023-11-16 23:37:12 +01:00 |
|
Swissky
|
d80068cc1b
|
Privileged File Delete
|
2023-11-04 15:52:29 +01:00 |
|
Swissky
|
e86f221fe8
|
Fix typo in MSI installer
|
2023-10-11 21:05:54 +02:00 |
|
Swissky
|
5556f6ff79
|
MSI Installer - PrivEsc
|
2023-10-11 21:03:47 +02:00 |
|
Swissky
|
86cc53244d
|
LOL Drivers
|
2023-04-07 09:22:07 +02:00 |
|
Swissky
|
2a3d175620
|
GraphQL and JWT rework v0.1
|
2023-03-05 12:05:43 +01:00 |
|
Swissky
|
f1a85f22b9
|
Windows Defenses
|
2023-02-12 18:17:09 +01:00 |
|
Swissky
|
5190829ab4
|
RustHound Examples
|
2022-12-30 11:01:31 +01:00 |
|
CravateRouge
|
e5a18a72c2
|
findstr ignore error and print results in file
|
2022-11-06 11:58:00 +01:00 |
|
CravateRouge
|
a287736a3a
|
Add Snaffpoint usage example
|
2022-11-04 14:15:08 +01:00 |
|
Fabian S. Varon Valencia
|
3adbd70b01
|
remove not found links
|
2022-10-24 12:29:59 -05:00 |
|
Fabian S. Varon Valencia
|
b00ba7f38d
|
replace currento 404 link with 200 time Machine web snapshot
|
2022-10-24 12:29:32 -05:00 |
|
Fabian S. Varon Valencia
|
9128b183d3
|
update link URL
|
2022-10-24 12:28:31 -05:00 |
|
Swissky
|
fe41254fde
|
XXS Public Example + PHP Filter RCE
|
2022-10-24 12:05:39 +02:00 |
|
7RU7H
|
22fe4d16e2
|
Update Windows -Privilege Escalation - Typo Fix
# Line 304 - Typo: `...\CurentControlSet\..` -> `...\CurrentControlSet\..`
|
2022-10-22 14:27:01 +01:00 |
|
Swissky
|
72a8556dc9
|
NodeJS Serialization
|
2022-09-23 11:21:29 +02:00 |
|
Swissky
|
2be739ea4f
|
Fixing TGS/ST
|
2022-09-06 10:03:49 +02:00 |
|
Swissky
|
fae02107df
|
Jetty RCE Credits
|
2022-09-04 14:24:16 +02:00 |
|
Swissky
|
811863501b
|
ESC9 - No Security Extension
|
2022-09-03 12:07:24 +02:00 |
|
Swissky
|
3066615cde
|
LAPS Access + Pass the Cert + Writeable folder
|
2022-05-31 11:57:44 +02:00 |
|
NocFlame
|
bebc87887a
|
added link to hashcat
|
2022-05-25 10:09:09 +02:00 |
|
NocFlame
|
2ef501f883
|
replaced backslash with forwardslash in cmd syntax
As defined in cmd.exe /?
/C Carries out the command specified by string and then terminates
|
2022-05-25 09:55:05 +02:00 |
|
Swissky
|
5a89c6a5ca
|
Windows Management Instrumentation Event Subscription
|
2022-04-24 15:01:18 +02:00 |
|
Swissky
|
540d3ca399
|
Vajra + MSSQL hashes
|
2022-03-05 18:31:15 +01:00 |
|
Swissky
|
e3fb516747
|
MAQ + WEBDAV
|
2021-12-29 14:48:42 +01:00 |
|
Swissky
|
7d9dd6806e
|
Powershell Cheatsheet
|
2021-11-06 19:14:47 +01:00 |
|
Swissky
|
c8076e99c9
|
Net-NTLMv1 + DriverPrinter
|
2021-09-06 20:58:44 +02:00 |
|
Swissky
|
87be30d3b2
|
DB2 Injection + ADCS
|
2021-08-10 23:00:19 +02:00 |
|
Swissky
|
d9d4a54d03
|
RemotePotato0 + HiveNightmare
|
2021-07-26 21:25:56 +02:00 |
|
Swissky
|
3a4bd97762
|
AD CS - Mimikatz / Rubeus
|
2021-07-25 11:40:19 +02:00 |
|
Swissky
|
44735975a5
|
Active Directory update
|
2021-07-12 20:45:16 +02:00 |
|
Swissky
|
80816aee31
|
PrintNightmare - #385
|
2021-07-01 14:40:03 +02:00 |
|
Swissky
|
a723a34449
|
PS Transcript + PPLdump.exe
|
2021-05-06 18:26:00 +02:00 |
|
Swissky
|
08b59f2856
|
AD update CME+DCOM
|
2021-04-21 22:27:07 +02:00 |
|
Swissky
|
f6b9d63bf8
|
DCOM exploitation and MSSQL CLR
|
2021-03-24 22:26:23 +01:00 |
|
Swissky
|
bd2166027e
|
GMSA Password + Dart Reverse Shell
|
2021-03-24 12:44:35 +01:00 |
|
Valentín Blanco
|
73f6ab940c
|
Update Windows - Privilege Escalation.md
Adding WES-NG which is a great and updated replacement for Windows-Exploit-Suggester.
|
2021-02-10 15:52:41 +01:00 |
|
PinkDev1
|
93769768e2
|
Added EoP - $PATH Interception
|
2021-01-28 19:45:54 +00:00 |
|
Swissky
|
01aadf3a44
|
Alternate Data Stream
|
2021-01-13 10:22:59 +01:00 |
|
Swissky
|
19a2950b8d
|
AMSI + Trust
|
2020-12-08 14:31:01 +01:00 |
|
Gorgamite
|
f9389d708b
|
Added winPEAS to windows privilege escalation tool
WinPEAS is a really thorough privesc enumeration tool for windows, you can find it here: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe
It doesn't auto exploit, but it's rather thorough and effective.
|
2020-10-29 03:57:40 -07:00 |
|
Swissky
|
5a1ae58a59
|
Sticky Notes Windows + Cobalt SMB
|
2020-10-16 11:35:15 +02:00 |
|
Swissky
|
c9be68f0a1
|
Privilege File Write - Update
|
2020-10-08 16:51:11 +02:00 |
|
Swissky
|
0df0cc9cf8
|
Privileged File Write
|
2020-10-08 16:39:25 +02:00 |
|
Swissky
|
c7e3ea005e
|
Powershell Remoting
|
2020-08-09 12:15:56 +02:00 |
|
Swissky
|
ca9326b5fc
|
Driver Privilege Escalation
|
2020-07-13 15:00:36 +02:00 |
|
Swissky
|
5323ceb37c
|
SUDO CVE + Windows Drivers PrivEsc
|
2020-05-28 11:19:16 +02:00 |
|
Swissky
|
c1731041b5
|
Misc & Tricks Page + AMSI + Defender
|
2020-05-16 13:22:55 +02:00 |
|