mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2026-05-23 13:23:01 +08:00
fix: address code review comments (grammar and capitalization)
Agent-Logs-Url: https://github.com/Mr-xn/Penetration_Testing_POC/sessions/14660dda-79ff-4703-a8ac-f3162c6909a1 Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
71eb6a4d46
commit
91a3e5a76c
@@ -837,7 +837,7 @@
|
||||
- [CVE-2020-2696 – Local privilege escalation via CDE dtsession](https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtsession_ipa.c)
|
||||
- [CVE-2020-0683-利用Windows MSI “Installer service”提权(Windows 7/8.1/10, Server 2008/2012/2016/2019)](https://github.com/padovah4ck/CVE-2020-0683/)
|
||||
- [Linux sudo提权辅助工具—查找sudo权限配置漏洞](https://github.com/TH3xACE/SUDO_KILLER)
|
||||
- [Windows提权-CVE-2020-0668:Windows Service Tracing本地提权漏洞(Windows 10 ≥ build 1903 用UsoDllLoader;Windows < build 1903 用diaghub)](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
|
||||
- [Windows提权-CVE-2020-0668:Windows Service Tracing本地提权漏洞(Windows 10 ≥ build 1903 使用UsoDllLoader;Windows < build 1903 使用diaghub)](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
|
||||
- [Linux提取-Linux kernel XFRM UAF poc (3.x - 5.x kernels)2020年1月前没打补丁可测试](https://github.com/duasynt/xfrm_poc)
|
||||
- [linux-kernel-exploits Linux平台提权漏洞集合(覆盖 Linux 2.4 - 5.x 内核版本)](https://github.com/SecWiki/linux-kernel-exploits)
|
||||
- [Linux提权辅助检测Perl脚本](https://github.com/jondonas/linux-exploit-suggester-2)|[Linux提权辅助检测bash脚本](https://github.com/mzet-/linux-exploit-suggester)|[Unix-PrivEsc:本地 Unix 系统提权集合](https://github.com/FuzzySecurity/Unix-PrivEsc)
|
||||
@@ -889,7 +889,7 @@
|
||||
- [【Linux 提权】CVE-2022-2639-PipeVersion(Linux kernel 3.13 - 5.17)](https://github.com/avboy1337/CVE-2022-2639-PipeVersion)
|
||||
- [【Linux 提权】CVE-2022-2588(Linux kernel 3.17 - 5.18,需user namespaces)](https://github.com/Markakd/CVE-2022-2588)
|
||||
- [【Windows 提权】PetitPotato:通过PetitPotam进行本地提权(支持所有Windows版本,含Server 2022 21H2)](https://github.com/wh0Nsq/PetitPotato)
|
||||
- [LocalPotato(CVE-2023-21746):一个使用新potato技术来进行windows本地提权(Windows 10/11, Server 2019/2022;HTTP/WebDAV场景在打补丁后仍可用)](https://github.com/decoder-it/LocalPotato)
|
||||
- [LocalPotato(CVE-2023-21746):一个使用新potato技术来进行Windows本地提权(Windows 10/11, Server 2019/2022;HTTP/WebDAV场景在打补丁后仍可用)](https://github.com/decoder-it/LocalPotato)
|
||||
- [EfsPotato:Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability)(适用于具有SeImpersonatePrivilege权限的Windows环境)](https://github.com/zcgonvh/EfsPotato)
|
||||
- [【Linux 提权】CVE-2023-32233: Linux Kernel 权限提升漏洞(Linux kernel < 6.3.1,测试于Ubuntu 23.04 kernel 6.2.0-20-generic)](https://github.com/Liuk3r/CVE-2023-32233)
|
||||
- [【Linux 提权】CVE-2023-0386: Linux OverlayFS权限提升漏洞(Linux kernel < 6.2)](https://github.com/veritas501/CVE-2023-0386)
|
||||
|
||||
Reference in New Issue
Block a user