130n@calvinlai.com
Ctrlk
  • About Calvin Lai (fkclai)
  • My Work
  • Cyber Security
    • Cyber Security Centre (CSC)
  • Detection and Response
  • Application Architecture
    • Student Module Registration Flow Series using Microservices & Event-Driven Architecture
    • Comparison of MVC , N-tier and Microservice Architecture
  • AI: Using RAG-Based Enquiry Assistant using Vector Database
  • Application Security
    • Securing React Native Applications with Java Microservices
    • Securing WebView-Based Mobile Applications with Java Microservices
    • OAuth, SAML, and OpenID Connect: Key Differences and Use Cases
    • Secure Coding Principles
    • HTTP Header Security Principles
    • Mitigating Broken Object Level Authorization (BOLA)
    • Spring Boot Validation
    • Output Encoding in JavaServer Faces (JSF)
    • Session Management Security Issues
    • Common API Security Problems
    • JAVA Exception Handling
    • File Upload Validation
    • OAuth 2.0 Security
    • Microservice Security
    • Modifying and Protecting Java Class Files
    • JAVA Program
  • Exploit/CVE PoC
    • ZeroLogon Exploit
    • Remote Retrieved Chrome saved Encrypted Password
    • Twitter Control an RCE attack
  • Hacking Report (HTB)
    • Hits & Summary
    • Windows Machine
    • Linux Machine
  • Penetration Testing
    • Web Application PenTest
    • Network/System PenTest
    • Mobile Penetration Test
  • Threat Intelligence
    • Advanced Persistent Threat (APT) groups
  • Red Team (Windows)
    • 01 Reconnaissance
    • 02 Privileges Escalation
    • 03 Lateral Movement
    • 04 AD Attacks
    • 05 Bypass-Evasion
    • 06 Kerberos Attack
    • 99 Basic Command
  • Exploitation Guide
    • 01 Reconnaissance
    • 02 Port Enumeration
    • 03 Web Enumeration
    • 04 Windows Enum & Exploit
    • 05 File Enumeration
    • 06 Reverse Shell Cheat Sheet
    • 07 SQL Injection
    • 08 BruteForce
    • 09 XSS Bypass Checklist
    • 10 Spring Boot
    • 11 WPA
    • 12 Payload list
  • Vuln Hub (Writeup)
    • MrRobot
    • CYBERRY
    • MATRIX 1
    • Node-1
    • DPwwn-1
    • DC7
    • AiWeb-2
    • AiWeb-1
    • BrainPan
  • CTF (Writeup & Tips)
    • CTF Tools & Tips
    • Hacker One
    • CTF Learn
    • P.W.N. University - CTF 2018
    • HITCON
    • Pwnable
  • Useful Command/Tools
    • Kali
    • Windows
    • Linux
  • Offensive Security Lab & Exam
    • Lab
    • Tools for an Offensive Certification
      • Strategy for an Offensive Exam Certification
        • CVEs
        • Privilege Escalation
        • Commands
        • Impacket
  • ISO 27001
    • Disclaimer
    • What is ISO 27001
    • Documentation
    • Common Mistake
    • Q&A
    • ISO 27001 Controls and Domains
  • Risk Management
Powered by GitBook
On this page
  • Automatic PE enumeration Tools
  • Windows
  • Linux
  • Manual PE Trips

Was this helpful?

  1. Offensive Security Lab & Exam
  2. Tools for an Offensive Certification
  3. Strategy for an Offensive Exam Certification

Privilege Escalation

Automatic PE enumeration Tools

Windows

LogoPEASS-ng/winPEAS at master · peass-ng/PEASS-ngGitHub
LogoPowerSploit/Privesc at master · PowerShellMafia/PowerSploitGitHub
PowerSploit: Powerup.ps
LogoGitHub - GhostPack/SharpUp: SharpUp is a C# port of various PowerUp functionality.GitHub

Linux

LogoGitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation ChecksGitHub
LogoPEASS-ng/linPEAS at master · peass-ng/PEASS-ngGitHub
LogoGitHub - Tib3rius/AutoRecon: AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.GitHub

Manual PE Trips

LogoPage not found - HackTricksbook.hacktricks.xyz
Windows Privilege Escalation - ResourcesSiren Security
Linux Privilege Escalation - ResourcesSiren Security
PreviousCVEsNextCommands

Last updated 2 years ago

Was this helpful?