├── Escalate - A Linux Vulnerable Virtual Machine ├── Escalate - A Windows Vulnerable Virtual Machine └── README.md /Escalate - A Linux Vulnerable Virtual Machine: -------------------------------------------------------------------------------- 1 | Description: 2 | Escalate_Linux - A intentionally developed Linux vulnerable virtual machine.The main focous of this machine is to learn Linux 3 | Post Exploitation (Privilege Escalation) Techniques. 4 | 5 | "Escalate_Linux" Linux vulnerable virtual machine contains different features. 6 | 7 | 1. 15+ ways of Privilege Escalation 8 | 2. Vertical Privilege Escalation 9 | 3. Horizontal Privilege Escalation 10 | 4. Multi-level Privilege Escalation 11 | 12 | 13 | Download Link: 14 | "Escalate_Linux" Download Link (OVA Format): 15 | Google Drive : https://drive.google.com/open?id=1ah38R3639I0RvVM7zte98waaa6jNt1BT 16 | 17 | 18 | Contact Information: 19 | Mail: admin@myhacker.online 20 | LinkedIn: https://www.linkedin.com/in/cehmanish/ 21 | -------------------------------------------------------------------------------- /Escalate - A Windows Vulnerable Virtual Machine: -------------------------------------------------------------------------------- 1 | Escalate_Win - A intentionally developed windows vulnerable virtual machine.The main focous of this machine is to learn Windows 2 | Post Exploitation (Privilege Escalation) Techniques. 3 | 4 | 5 | "Escalate_Win" Windows vulnerable virtual machine contains different features. 6 | 7 | 1. 15+ ways of Privilege Escalation 8 | 2. Vertical Privilege Escalation 9 | 3. Horizontal Privilege Escalation 10 | 4. Multi-level Privilege Escalation 11 | 12 | Windows Privilege Escalation Techniques, which are used in our vulnerable virtual machine. 13 | 14 | 1. Buffer Overflow 15 | 2. DLL Injection 16 | 3. DLL Hijacking 17 | 4. Token Manipulation 18 | 5. Insecure Files Permission 19 | 6. Insecure Folders Permission 20 | 7. Insecure Service Permission 21 | 8. Insecure Registery Permission 22 | 9. Runas 23 | 10. AlwaysInstallElevated 24 | 11. Unquoted Service Paths 25 | 12. Kernel Exploitation 26 | 13. Stored Password 27 | 14. Runas Admin 28 | 15. UAC Bypass 29 | 16. Many More :) 30 | 31 | 32 | Download Link: 33 | "Escalate_Win" Download Link (OVA Format): 34 | Google Drive : https://drive.google.com/open?id=1-k4uyoLeqo-N8CA1Vf49hEKhjxAGajFn 35 | 36 | 37 | Contact Information: 38 | Mail: admin@myhacker.online 39 | LinkedIn: https://www.linkedin.com/in/cehmanish/ 40 | 41 | 42 | 43 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Vulnerable_Machine 2 | This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based. 3 | --------------------------------------------------------------------------------