Default Branch

80318c5005 · Merge pull request #514 from moscowchill/bat-pr · Updated 2025-11-15 06:45:38 -08:00

Branches

b188ac34b6 · Add linpeas privilege escalation checks from: HTB: Era – IDORs, PHP ssh2.exec Wrapper RCE, and Custom-Signed Binary Privilege · Updated 2025-11-29 10:48:21 -08:00

0
1

e99e64cddf · Add linpeas privilege escalation checks from: Metasploit Wrap-Up 11/28/2025 · Updated 2025-11-28 17:41:29 -08:00

0
1

dd220af544 · Add winpeas privilege escalation checks from: Metasploit Wrap-Up 11/14/2025 · Updated 2025-11-27 05:44:39 -08:00

0
1

4b73810ff2 · Add linpeas privilege escalation checks from: An Evening with Claude (Code): sed-Based Command Safety Bypass in Claude Code (C · Updated 2025-11-25 17:46:17 -08:00

0
1

11c0d14561 · Add winpeas privilege escalation checks from: HackTheBox Mirage: Chaining NFS Leaks, Dynamic DNS Abuse, NATS Credential Theft, · Updated 2025-11-22 10:54:22 -08:00

0
1

49db1df468 · Add linpeas privilege escalation checks from: SupaPwn: Hacking Our Way into Lovable’s Office and Helping Secure Supabase · Updated 2025-11-19 10:59:41 -08:00

0
1

9dc23cf01d · Add winpeas privilege escalation checks from: bloodyAD: Active Directory Privilege Escalation Swiss Army Knife · Updated 2025-11-15 04:56:39 -08:00

4
1

7ea9479d47 · Add linpeas privilege escalation checks from: Critical: Remote Code Execution via Malicious Obfuscated Malware in Imunify360 A · Updated 2025-11-13 04:56:37 -08:00

4
1

2e5bae66ea · Add linpeas privilege escalation checks from: HTB: Dump — Zip argument injection to RCE and tcpdump sudo misconfig to root · Updated 2025-11-04 04:57:12 -08:00

4
1

13d3b1ab89 · Add winpeas privilege escalation checks from: Recent Vulnerabilities in Redis Server’s Lua Scripting Engine · Updated 2025-11-03 10:51:13 -08:00

4
2

54ded7e0bb · Add linpeas privilege escalation checks from: HTB: Store — URL‑encoded traversal + static XOR → secrets → Node inspector RCE → · Updated 2025-10-30 06:48:26 -07:00

4
1

1bc5a4d11b · Add linpeas privilege escalation checks from: ksmbd - Exploiting CVE-2025-37947 (3/3) · Updated 2025-10-16 06:04:42 -07:00

7
1

8d4fcca217 · Add linpeas privilege escalation checks from: HTB Watcher — From Zabbix CVE‑2024‑22120 to Admin/RCE and a TeamCity Root Pivot · Updated 2025-10-09 05:57:04 -07:00

7
1

e15a1f2e12 · Update 16_Crontab_UI_misconfig.sh · Updated 2025-10-04 01:38:02 -07:00

20
0
Included

31bdb339d7 · Add linpeas privilege escalation checks from: Forgotten · Updated 2025-09-16 23:48:40 -07:00

22
0
Included

47aab8498b · Add linpeas privilege escalation checks from: Race Against Time in the Kernel’s Clockwork · Updated 2025-09-09 05:57:08 -07:00

23
1

4b3f4aa19e · Add linpeas privilege escalation checks from: HTB Environment: Laravel env override (CVE‑2024‑52301) → LFM upload RCE (CVE‑202 · Updated 2025-09-06 18:38:03 -07:00

22
0
Included

aaecb3e728 · Add linpeas privilege escalation checks from: HTB Eureka: From Actuator HeapDump to SSH, credential capture via Gateway, and r · Updated 2025-08-30 11:41:38 -07:00

37
1

54d861ab04 · Add winpeas privilege escalation checks from: HTB Sendai: From password spray to gMSA dump, then ADCS ESC4 or SQL+Silver Ticke · Updated 2025-08-28 11:51:59 -07:00

34
0
Included

ed01b32a95 · Add linpeas privilege escalation checks from: Case study: Backup leak → CI abuse → internal trust misconfigurations → escalati · Updated 2025-08-27 12:45:02 -07:00

36
0
Included