fix: address code review comments (grammar and capitalization)

Agent-Logs-Url: https://github.com/Mr-xn/Penetration_Testing_POC/sessions/14660dda-79ff-4703-a8ac-f3162c6909a1

Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com>
This commit is contained in:
copilot-swe-agent[bot]
2026-04-18 02:51:17 +00:00
committed by GitHub
parent 71eb6a4d46
commit 91a3e5a76c
+2 -2
View File
@@ -837,7 +837,7 @@
- [CVE-2020-2696 Local privilege escalation via CDE dtsession](https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtsession_ipa.c)
- [CVE-2020-0683-利用Windows MSI “Installer service”提权(Windows 7/8.1/10, Server 2008/2012/2016/2019](https://github.com/padovah4ck/CVE-2020-0683/)
- [Linux sudo提权辅助工具—查找sudo权限配置漏洞](https://github.com/TH3xACE/SUDO_KILLER)
- [Windows提权-CVE-2020-0668Windows Service Tracing本地提权漏洞(Windows 10 ≥ build 1903 用UsoDllLoaderWindows < build 1903 用diaghub](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
- [Windows提权-CVE-2020-0668Windows Service Tracing本地提权漏洞(Windows 10 ≥ build 1903 使用UsoDllLoaderWindows < build 1903 使用diaghub](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
- [Linux提取-Linux kernel XFRM UAF poc (3.x - 5.x kernels)2020年1月前没打补丁可测试](https://github.com/duasynt/xfrm_poc)
- [linux-kernel-exploits Linux平台提权漏洞集合(覆盖 Linux 2.4 - 5.x 内核版本)](https://github.com/SecWiki/linux-kernel-exploits)
- [Linux提权辅助检测Perl脚本](https://github.com/jondonas/linux-exploit-suggester-2)|[Linux提权辅助检测bash脚本](https://github.com/mzet-/linux-exploit-suggester)|[Unix-PrivEsc:本地 Unix 系统提权集合](https://github.com/FuzzySecurity/Unix-PrivEsc)
@@ -889,7 +889,7 @@
- [【Linux 提权】CVE-2022-2639-PipeVersionLinux kernel 3.13 - 5.17](https://github.com/avboy1337/CVE-2022-2639-PipeVersion)
- [【Linux 提权】CVE-2022-2588Linux kernel 3.17 - 5.18,需user namespaces](https://github.com/Markakd/CVE-2022-2588)
- [【Windows 提权】PetitPotato:通过PetitPotam进行本地提权(支持所有Windows版本,含Server 2022 21H2](https://github.com/wh0Nsq/PetitPotato)
- [LocalPotatoCVE-2023-21746):一个使用新potato技术来进行windows本地提权(Windows 10/11, Server 2019/2022HTTP/WebDAV场景在打补丁后仍可用)](https://github.com/decoder-it/LocalPotato)
- [LocalPotatoCVE-2023-21746):一个使用新potato技术来进行Windows本地提权(Windows 10/11, Server 2019/2022HTTP/WebDAV场景在打补丁后仍可用)](https://github.com/decoder-it/LocalPotato)
- [EfsPotatoExploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability)(适用于具有SeImpersonatePrivilege权限的Windows环境)](https://github.com/zcgonvh/EfsPotato)
- [【Linux 提权】CVE-2023-32233: Linux Kernel 权限提升漏洞(Linux kernel < 6.3.1,测试于Ubuntu 23.04 kernel 6.2.0-20-generic](https://github.com/Liuk3r/CVE-2023-32233)
- [【Linux 提权】CVE-2023-0386: Linux OverlayFS权限提升漏洞(Linux kernel < 6.2](https://github.com/veritas501/CVE-2023-0386)