⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • 🏠HOME
    • About Me
  • 🛡️PENTESTING
    • RECON
    • SERVICES
    • WEB
    • OPERATIONS
    • PRIVESC
      • linux
      • windows
        • Windows Privilege Escalation Checklist
        • attacking-lsass
        • Dumping LSA secrets
        • copy-ntds.dit
        • copy-sam-database
        • Attacking active directory
        • credential-hunting
        • ntlm-pass-the-hash
        • Windows authentication process
        • credential-theft
        • group-privileges
        • information-gathering
        • os
          • dll-injection
          • kernel-exploit 1
          • kernel-exploit
          • Legacy Operating Systems
          • restricted-environments-citrix-breakout
          • user-account-control
          • vulnerable-services
          • weak-permision
          • windows-10-14393-exploit
          • windows-desktop-versions
          • windows-server
        • recon
        • user-privileges
    • ACTIVE DIRECTORY
  • ⚒️COURSES
    • CPTS
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🛡️PENTESTINGchevron-right
  2. PRIVESCchevron-right
  3. windows

os

dll-injectionchevron-rightkernel-exploit 1chevron-rightkernel-exploitchevron-rightLegacy Operating Systemschevron-rightrestricted-environments-citrix-breakoutchevron-rightuser-account-controlchevron-rightvulnerable-serviceschevron-rightweak-permisionchevron-rightwindows-10-14393-exploitchevron-rightwindows-desktop-versionschevron-rightwindows-serverchevron-right
Previoustechniqueschevron-leftNextdll-injectionchevron-right

Last updated 21 hours ago