The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
Stars
929
Forks
203
Watchers
929
Open Issues
0
Overall repository health assessment
No package.json found
This might not be a Node.js project
exit the thread; not the process, due to migrate to winlogon.exe in the exploit impl.
f7fbfa3View on GitHubIntegrate CVE-2020-0796 (SMBGhost) LPE from the Metasploit Framework.
2961abeView on GitHubUse &payload_local to generate a payload with parent-session inherited pointers when parent is same-arch and .stage.smartinject is true.
4f70b56View on GitHubUpdated &bpowershell and &bpowerpick in Aggressor Script to accept a download cradle argument (to avoid the powershell-import one). This updates Elevate Kit to use that.
06c23b0View on GitHubmake the schtasks.exe via SilentCleanup UAC bypass into a priv esc exploit too.
437aa6eView on GitHubHandle the paths in a way that's friendly to Windows Cobalt Strike clients.
61c464aView on GitHub15
commits