

GitHub - AlessandroZ/BeRoot: Privilege Escalation Project - Windows / Linux / Ma...
source link: https://github.com/AlessandroZ/BeRoot
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

README.md
BeRoot Project
BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.
It has been added to the pupy project as a post exploitation module (so it will be executed in memory without touching the disk).
This tool does not realize any exploitation. It mains goal is not to realize a configuration assessment of the host (listing all services, all processes, all network connection, etc.) but to print only information that have been found as potential way to escalate our privilege.
This project works on Windows, Linux and Mac OS. You could find the Windows version here and the Linux and Mac OS here
I recommend reading the README depending on the targeted OS, to better understand what's happening.
Enjoy ;)
Interesting projects
Recommend
-
65
The LaZagne Project !!! Description The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its pass...
-
75
-
20
In this post, I’ll discuss an arbitrary file move vulnerability I found in Windows Service Tracing . From my testing, it affected all versions of Windows from Vista to 10 but it’s probably even older because thi...
-
11
RemotePotato0 Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to escalate your privileges from a generic User to Domain Admin. Briefly:
-
10
CVE-2019-1378: Exploiting an Access Control Privilege Escalation Vulnerability in Windows 10 Update Assistant (WUA) Introduction Windows 10 is an incredibly feature rich Operating System (OS). ...
-
16
Local Privilege Escalation Edition of CVE-2021-1675 Local Privilege Escalation implementation of the CVE-2021-1675 (a.k.a PrintNightmare). The exploit is edited from published by Zhiniang Peng (@edwardzpeng) & Xuefeng Li (@lxf029...
-
27
Usage RoguePotato @splinter_code & @decoder_it Mandatory args: -r remote_ip: ip of the remote machine to use as redirector -e commandline: commandline of the program to launch Optional args: -l listen...
-
10
KrbRelay with RBCD Privilege Escalation HOWTO Short HOWTO about one use case of the work from Cube0x0 (KrbRelay) and others. TL;DR No-Fix Local Privilege Es...
-
11
Windows 11 10.0.22000 - Backup service Privilege Escalation
-
5
Contributor Bug Description changing settings without privileges....
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK