Priv Esc
Most of the contents of this were redacted before publication, sorry
General Principles¶
- What information can you obtain from X?
- What trust relations are compromised by you controlling X?
Linux¶
- https://github.com/carlospolop/PEASS-ng
- https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist
Windows¶
Last update: 2021-09-01