mirror of https://github.com/n1nj4sec/pupy.git
Updated Post Exploitation (markdown)
parent
4b728a3f2d
commit
19e90fc841
|
@ -14,7 +14,7 @@ Depending on the system and context, you should launch system command using one
|
|||
- `Beroot`: find ways to elevate our privilege - from user to admin (windows/linux), check the [github](https://github.com/AlessandroZ/BeRoot) for more information.
|
||||
- `privesc_checker`: find well knows vulnerabilities on non up to date systems (windows/linux). [linux-exploit-suggester](https://github.com/mzet-/linux-exploit-suggester) is used on linux and [windows-exploit-suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) on windows.
|
||||
- `sudo_alias`: basic sudo alias (linux).
|
||||
- `bypassuac`: bypass uac when possible - admin privilege required (windows).
|
||||
- `bypassuac`: bypass uac when possible - admin privilege required (windows). Check [WinPwnage](https://github.com/rootm0s/WinPwnage) github for more information.
|
||||
- `getsystem`: once uac bypassed, get system privilege (windows).
|
||||
|
||||
## Credentials
|
||||
|
|
Loading…
Reference in New Issue