Tools and Utilities
Last updated
Was this helpful?
Last updated
Was this helpful?
Here we can find some tools and utilities commonly used for practices related to post-exploitation:
Script that searches for possible paths to escalate privileges on Linux/Unix*/MacOS hosts
Installation
Usage
Script that searches for possible paths to escalate privileges on Windows hosts
Usage
List of Unix binaries used to bypass local security restrictions in misconfigured systems
Enumerate basic system info and search for common privilege escalation vectors on Linux systems