Post-Exploitation
Linux – Post-Exploitation
Enumeration Post-Exploitation
- linux-exploit-suggester – Enumeration Linux kernelLinux-based machine
- LinEnum – Linux Config Enumeration
- Linux Config Enumeration – Linuxprivchecker
- Linux Config Enumeration – Unix-Privesc-CheckLinux
Linux privilege escalation techniques:
- Perl – Privilege Escalation
- Nmap – Privilege Escalation
- find – privilege escalation
- service – Privilege Escalation
- apt-get – Privilege escalation
- wget – Privilege Escalation
- HT – privilege escalation
Cron
CVE
Windows – Post-Exploitation
CVE Exploits
- Windows MS10_092 – Schelevator – Privilege Escalation
- Windows Exploit MS15-051 – CVE-2015-1701 – Privilege Escalation