-
Updated
Dec 6, 2020 - Python
privilege-escalation
Here are 119 public repositories matching this topic...
-
Updated
Nov 11, 2020
-
Updated
Nov 8, 2020
-
Updated
Nov 30, 2020 - PowerShell
-
Updated
Nov 5, 2020
-
Updated
Nov 16, 2020
-
Updated
Nov 30, 2020 - Shell
-
Updated
Jan 14, 2019 - C++
-
Updated
Mar 30, 2020 - C
-
Updated
Nov 22, 2020
-
Updated
Nov 29, 2020 - PowerShell
-
Updated
Nov 23, 2020 - PowerShell
-
Updated
Nov 8, 2020 - Shell
-
Updated
Dec 4, 2020 - Python
-
Updated
Nov 14, 2020 - PowerShell
-
Updated
Feb 22, 2018 - Python
-
Updated
Mar 25, 2020 - Python
-
Updated
May 9, 2019 - Python
-
Updated
Dec 2, 2020 - Shell
-
Updated
Nov 22, 2020 - Pascal
-
Updated
Aug 20, 2020
-
Updated
Dec 2, 2020
-
Updated
Feb 20, 2020
-
Updated
Dec 5, 2020 - Go
-
Updated
Oct 2, 2019 - Python
-
Updated
Oct 9, 2020 - Python
-
Updated
Dec 23, 2019
-
Updated
Oct 11, 2019 - Ruby
Improve this page
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."
Current implementation of
proclistplugin useswin32_ps_list_procs()php function on Windows host.Therefore, linux implementation is a simple
system("ps -a"), which is OPSEC unsafe, an would probably trigger EDR alerts.A better implementation should avoid relying on system command execution.