Found 19 repositories(showing 19)
NIGHTFURY0X01
Personal TryHackMe CTF writeups focused on web, Linux, privilege escalation techniques and Etc...
adarsh-hue799
Structured Linux Privilege Escalation notes from TCM Security course — covering enumeration, exploitation techniques, CVEs and hands-on practice on TryHackMe labs.
LuCyanXsecurity
IA: Tornado is an intermediate Linux CTF on VulnHub. Challenges include web enumeration techniques, SQL Truncation exploits, encrypted file decoding, remote code execution, and privilege escalation based on creative Caesar Cipher password guessing.
Pratham-verma
This repository contains my structured documentation and hands-on notes on Linux Privilege Escalation techniques, gathered during real-world penetration testing, lab practice. The goal of this repository is to provide a practical, step-by-step understanding of how attackers escalate privileges and how defenders can prevent it.
Performed vulnerability assessment on DVWA using Kali Linux and Metasploitable .Exploited SQL Injection, XSS, and Command Injection vulnerabilities. Conducted network scanning using Nmap and web scanning using Nikto. Demonstrated privilege escalation and data extraction techniques .
labex-labs
In this course, you will learn about privilege escalation techniques on Linux. It is a beginner level course and will cover various techniques to escalate privileges on Linux systems.
radu2208
A collection of privilege escalation techniques and hands-on examples in Linux environments.
nirmal0xploit
A hands-on CTF challenge focused on Linux privilege escalation and real-world exploitation techniques. Ask ChatGPT
BAWA-DOOM
Linux privilege escalation toolkit focused on system enumeration, SUID binaries, cron jobs, and controlled exploitation techniques.
arjun-k396
Hands-on practice of Linux privilege escalation enumeration techniques including sudo, SUID, cron jobs, writable files, and environment variables.
Ataur1502
A personal lab for Linux privilege escalation. This repository documents real-world privilege escalation techniques performed on custom VMware VMs. Covers enumeration, misconfigurations, SUID/SGID abuse, environment hijacking, kernel exploits, and more. Each technique includes hands-on examples, tools used, and mitigation insights.
CyberErick
Simulated post-exploitation project demonstrating privilege escalation, SSH backdoor creation, persistence techniques, and password cracking on a Linux system using Bash tools and John the Ripper.
KdMenon007
# 🔥 Linux Privilege Escalation This repo explores various techniques to escalate privileges on Linux systems. From misconfigurations to kernel exploits, we dive deep into common vulnerabilities and methods used by attackers to gain root access. ⚠️ **For educational purposes only. Use responsibly.**
Nathan-B-97
This repo contains information on how to escalate privileges on a Linux machine. The information here documented came from TryHackMe website. There are many techniques we can use to escalate privileges on a Linux machine, we are going to be listing 8 in here.
TPrzybycien
The Explosion machine on Hack The Box is a beginner-to-intermediate level Linux box designed to introduce users to common exploitation techniques, including service misconfigurations, file inclusion vulnerabilities, and privilege escalation.
This is a Privileges Escalation Scan tool for Linux OS, scanning and showing result on terminal. Also, showing some of the hardening and exploitation technique for certain vulnerabilities.
sargonradiyeh
A comprehensive ethical hacking CTF report, covering a full-scale enterprise network compromise across Windows Active Directory and Linux systems. Includes enumeration, exploitation, privilege escalation, credential attacks, and remediation strategies based on real-world techniques.
SallarKhan69
This repository includes hands-on labs, penetration testing notes, Active Directory attacks, privilege escalation techniques, scripting, and red team methodologies based on real-world adversary simulation practices. Focus Areas: Networking • Linux • Web Exploitation • Active Directory • Command & Control • Defense Evasion • MITRE ATT&CK Mapping
R3fr4kt
Bounty Hacker is a beginner-level Linux machine from TryHackMe designed to simulate real-world penetration testing scenarios. It focuses on fundamental techniques such as service enumeration, anonymous FTP access, credential discovery, brute-forcing SSH, and privilege escalation through misconfigured binaries.
All 19 repositories loaded