try hack me
Ctrlk
  • what is this repo?
  • Pre Security
    • Introduction to Cyber Security
    • Linux Fundamentals
  • pre security Tools
    • gobuster
    • ping (ICMP)
    • nslookup
    • basic Linux commands
    • basic Linux operators
    • some Linux web command
    • processes
    • cron tabs (schedule)
    • Important Directories
    • basic CMD command
    • ssh
    • ftp
    • simple digital forensics commands
  • Complete Begginer
    • CVE tracking websites
    • traceroute
    • whois
    • dig
    • nmap
    • smb
    • Telnet
    • ftp
    • hydra
    • NFS
    • smtp
    • mysql
    • 🅱️Burp Suite
    • OWASP top 10 : 2021
    • file type recognition
    • upload vulnerability exploiting
    • about hash
    • john the ripper
    • Encryption
    • metasploit
    • Shell
    • privilege esclation
      • Exploiting Writeable /etc/passwd
      • Vi, sudo -l, GTFOBin
      • Cron tab exploitation
      • Exploiting PATH Variable
      • some checklists
      • windows
      • Examples
    • file transfer between two machines
  • SQL injection
  • Google Dorking
  • Web hacking intro
    • Walking an application
    • Content Discovery(ffuf, dirb, gobuster)
    • Subdomain Enumeration
    • Authentication bypass
    • IDOR
    • File Inclusion
Powered by GitBook
On this page
  1. Complete Begginer
  2. privilege esclation

some checklists

Below is a list of good checklists to apply to CTF or penetration test use cases:

LogoChecklists/Linux-Privilege-Escalation.md at master · netbiosX/ChecklistsGitHub
LogoPayloadsAllTheThings/Methodology and Resources/Linux - Privilege Escalation.md at master · swisskyrepo/PayloadsAllTheThingsGitHub
https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.htmlsushant747.gitbooks.io
https://payatu.com/guide-linux-privilege-escalationpayatu.com

PreviousExploiting PATH VariableNextwindows

Last updated 1 year ago