Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rsmudge/ElevateKit
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
https://github.com/rsmudge/ElevateKit
Last synced: about 2 months ago
JSON representation
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
- Host: GitHub
- URL: https://github.com/rsmudge/ElevateKit
- Owner: rsmudge
- Created: 2016-12-08T03:51:09.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2020-06-22T21:12:24.000Z (over 4 years ago)
- Last Synced: 2024-07-31T14:18:28.452Z (4 months ago)
- Language: PowerShell
- Homepage: https://www.cobaltstrike.com/help-beacon
- Size: 247 KB
- Stars: 877
- Watchers: 32
- Forks: 197
- Open Issues: 0
-
Metadata Files:
- Readme: README.txt
Awesome Lists containing this project
- awesome-rainmana - rsmudge/ElevateKit - The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload. (PowerShell)
- awesome-hacking-lists - rsmudge/ElevateKit - The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload. (PowerShell)
README
Elevate Kit
=========<>
The Elevate Kit demonstrates how to use third-party privilege escalation attacks
with Cobalt Strike's Beacon payload.Elevate Kit is for Cobalt Strike 3.6 and later.
https://www.cobaltstrike.com/Information on Aggressor Script is at:
https://www.cobaltstrike.com/aggressor-script/Demonstration video:
https://www.youtube.com/watch?v=sNKQVchyHDIHow to use
========<>
1. Download this repository
git clone https://github.com/rsmudge/ElevateKit.git2. Load elevate.cna into Cobalt Strike.
- Go to Cobalt Strike -> Scripts, press Load, select elevate.cna3. Interact with a Beacon
4. The Elevate Kit registers elevators AND privilege escalation exploits.
An elevator runs a command in an elevated context. Type 'runasadmin' to
see a list of available privilege elevators.An exploit spawns a payload in an elevated context. Type 'elevate' to
see a list of available privilege escalation attacks.5. Type 'elevate ' to spawn a session in an elevated context.
Use 'runasadmin ' to run a command in an elevated
context.License (elevate.cna)
=====<>
Copyright: 2016, Strategic Cyber LLC
License: BSD-3-clauseModules
=====<>
The included DLL and .ps1 files are developed by other authorscve-2020-0796: SMBv3 Compression Buffer Overflow (SMBGhost) (CVE 2020-0796)
https://github.com/rapid7/metasploit-framework/tree/master/external/source/exploits/CVE-2020-0796
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2020_0796_smbghost.rbAuthor: Daniel García Gutiérrez, Manuel Blanco Parajón, Spencer McIntyre
License: Metasploit License (BSD)ms14-058: TrackPopupMenu Win32k NULL Pointer Dereference (CVE-2014-4113)
https://github.com/rapid7/metasploit-framework/tree/master/external/source/exploits/cve-2014-4113
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms14_058_track_popup_menu.rbAuthor: Unknown, Juan Vazquez, Spencer McIntyre, OJ Reeves
License: BSD 3-Clausems15-051: Windows ClientCopyImage Win32k Exploit (CVE 2015-1701)
https://github.com/rapid7/metasploit-framework/tree/master/external/source/exploits/cve-2015-1701
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms15_051_client_copy_image.rbAuthor: Unknown, hfirefox, OJ Reeves, Spencer McIntyre
License: BSD 3-Clausems16-016: WebDav Local Privilege Escalation (CVE 2016-0051)
https://github.com/rapid7/metasploit-framework/tree/master/external/source/exploits/cve-2016-0051/dll
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms16_016_webdav.rbAuthor: Tamas Koczka & William Webb
License: BSD 3-Clausems16-032: Secondary Logon Handle Privilege Escalation (CVE-2016-099)
https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-MS16032.ps1Author: Ruben Boonen (@FuzzySec)
License: BSD 3-Clauseuac-eventvwr: Bypass UAC with eventvwr.exe
https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-EventVwrBypass.ps1Author: Matt Nelson (@enigma0x3)
License: BSD 3-Clauseuac-schtasks: Bypass UAC with schtasks.exe (via SilentCleanup)
https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-EnvBypass.ps1Author: Petr Medonos (@PetrMedonos)
License: BSD 3-Clauseuac-wscript: Bypass UAC with wscript.exe
https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-WScriptBypassUAC.ps1Author: @enigma0x3, @harmj0y, Vozzie
License: BSD 3-Clause