Repository navigation
privelage-escalation
- Website
- Wikipedia
📦 An independent package manager that every hacker deserves.
Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing
Local Privilege Escalation to Root via Sudo chroot in Linux
Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
POC OF CVE-2022-21970
C2 Server for pentesting, exploitation, and payload creation
A privilege escalation detection and prevention system for GNU/Linux hosts
Collection of notes that I have gathered during my studies for the Certified Red Team Professional (CRTP) exam.
Helper script for checking SUID/SUDO permissions against GTFOBin data.
A Command And Control Server + Worm
Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨
Trusted Installer DO
A Minimalistic UAC bypass using Windows Fodhelper.exe auto-elevation trick. Pure registry hijack, no prompts, silent power move.
Brief overview of how I solved the first PWN CTF Challenge for my Ethical Penetration Testing course.
FaultLine is a personal hacking toolkit I’ve been building to help with everything from network recon to exploitation and post-exploitation. It started as a way to make my own bug bounty hunting and red team work faster and more efficient. It's not perfect and still a work in progress.
This repository contains a Proof-of-Concept (PoC) exploit for the Baron Samedit vulnerability (CVE-2021-3156). The exploit demonstrates privilege escalation on Ubuntu 20.04 with sudo version 1.8.31 and glibc version 2.31. It includes an assembly-based exploit, a shared object payload, and a Makefile for automated compilation.