An open API service indexing awesome lists of open source software.

https://github.com/codershiyar/WinPrivilegeEscalation

This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test
https://github.com/codershiyar/WinPrivilegeEscalation

admin-rights bypass-admin-rights escalate-privilages escalation ethical-hacking exploit-development misconfiguration penetration-testing privilege-escalation privilege-escalation-tool security-research vulnerability-exploitation windows-10 windows-privilege-escalation windows-security

Last synced: 2 months ago
JSON representation

This repository provides easy-to-follow methods for gaining admin rights (privilege escalation) on Windows 10, 11, and newer systems. Learn how to identify and exploit misconfigurations, weak permissions, and common security flaws to escalate user privileges. Perfect for ethical hackers, penetration testers, and security researchers looking to test

Awesome Lists containing this project

README

        

# README: Gaining Admin Rights for Users in Windows Systems

## Overview
In this project, you will find several methods that allow users to escalate privileges and gain admin rights in Windows systems. The detailed steps and techniques are provided in the accompanying **HTML** or **PDF** file included in this project.

- [English Version](https://github.com/codershiyar/Cybersecurity-WinPrivilegeEscalation/tree/main/english-version)

## Methods Included:
1. **Exploiting Scheduled Tasks in the "Tasks Migrated" Folder**
2. **Modifying Services via Registry**
3. **Exploiting Unquoted Service Paths**
4. **Abusing Services via AccessChk**
5. **Hiding Activities using Windows Defender Exclusions**
6. **Pass-the-Hash Attack with Mimikatz**
7. **DLL Hijacking Attack**

## Important Notes
- The content is for **educational purposes** and should only be used in authorized environments.
- Refer to the **HTML** or **PDF** file for detailed instructions on each method.
- It is in Dutch

**Disclaimer:** This project is intended for **educational purposes only** and should be used for learning ethical hacking, penetration testing, and cybersecurity practices. The techniques and tools discussed are meant for use in **authorized environments** or with explicit permission. Unauthorized access to systems or networks is **illegal** and against GitHub's acceptable use policy.