mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-11-10 15:14:34 +00:00
ff3b45e0b7
I very strongly recommend adding LinPEAS to the enumeration tools. LinPEAS is arguably the best linux privesc enumeration tool out there. If you haven't used it, I'd try it out. It highlights all relevant information with color coded text, and you can pass it parameters to control the thoroughness of the scan. You should add WinPEAS for windows privesc as well. |
||
---|---|---|
.. | ||
Active Directory Attack.md | ||
Bind Shell Cheatsheet.md | ||
Cloud - AWS Pentest.md | ||
Cloud - Azure Pentest.md | ||
Cobalt Strike - Cheatsheet.md | ||
Container - Docker Pentest.md | ||
Linux - Persistence.md | ||
Linux - Privilege Escalation.md | ||
Metasploit - Cheatsheet.md | ||
Methodology and enumeration.md | ||
Miscellaneous - Tricks.md | ||
Network Discovery.md | ||
Network Pivoting Techniques.md | ||
Reverse Shell Cheatsheet.md | ||
Subdomains Enumeration.md | ||
Windows - Download and Execute.md | ||
Windows - Mimikatz.md | ||
Windows - Persistence.md | ||
Windows - Post Exploitation Koadic.md | ||
Windows - Privilege Escalation.md | ||
Windows - Using credentials.md |