Privilege Escalation
Last updated
Last updated
CrossC2: generate CobaltStrike's cross-platform payload.
TheFatRat: TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus.
traitor: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins.
DKMC: Don't kill my cat is a tool that generates obfuscated shellcode that is stored inside of polyglot images. The image is 100% valid and also 100% valid shellcode. The idea is to avoid sandbox analysis since it's a simple "legit" image. For now the tool relies on PowerShell to execute the final shellcode payload.
darkarmour: Store and execute an encrypted windows binary from inside memory, without a single bit touching disk.
donut: Donut is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies.
chimera: Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and antivirus solutions. It digests malicious PS1's known to trigger AV and uses string substitution and variable concatenation to evade common detection signatures.
Invoke-Stealth: This tool helps you to automate the obfuscation process of any script written in PowerShell with different techniques.
BetterXencrypt: A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
Invoke-SharpLoader: Load encrypted and compressed C# Code from a remote Webserver or from a local file straight to memory and execute it there.
PEASS: Privilege Escalation Awesome Scripts SUITE.
deepce: Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE).
unicorn: Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
InvisibilityCloak: Proof-of-concept obfuscation toolkit for C# post-exploitation tools.
Below is the difference in Seatbelt between unobfuscated and then obfuscated version with InvisibilityCloak against Microsoft Defender using Defender Check.
ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
PowerSploit: PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
Powerless: Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind.
Watson: Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities.
Sherlock: PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
JAWS: JAWS is a PowerShell script designed to help penetration testers (and CTFers) quickly identify potential privilege escalation vectors on Windows systems. It is written using PowerShell 2.0 so 'should' run on every Windows version since Windows 7.
AccessChk: Find misconfigured services.
MineSweeper: Windows user-land hooks manipulation tool.
pe-sieve: Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
hollows_hunter: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
SharpImpersonation: A User Impersonation tool - via Token or Shellcode injection.
PINKPHANTER: Windows x64 handcrafted token stealing kernel-mode shellcode
Koh: The Token Stealer.
gtfobins.github.io: GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
LinEnum: Linux sh script for privesc.
pspy: unprivileged Linux process snooping.