This repository contains basic privilege escalation techniques for Windows 11. It is designed for educational purposes to help cybersecurity professionals, penetration testers, and system administrators understand and mitigate privilege escalation risks.
The repository includes various PowerShell scripts for privilege escalation techniques, such as:
- UAC Bypass Methods (e.g.,
fodhelper.ps1,uac-obfuscate.ps1) - Credential Extraction (e.g.,
Saved Creds extract) - Task Manipulation for Privilege Escalation (
Create-task.ps1) - Background Execution Techniques (
install-python-bg.ps1)
Each script is meant to demonstrate security weaknesses that could be exploited by attackers, allowing defenders to strengthen their systems.
- Clone the repository:
git clone https://github.com/ShorterKing/Privilege-Escalation.git cd Privilege-Escalation - Review the scripts and understand their purpose before execution.
- Only run these scripts in a controlled environment where you have explicit permission.
To protect against privilege escalation attacks, consider:
✅ Keeping your system and software up to date.
✅ Using least privilege principles for user accounts.
✅ Enabling application whitelisting and restricting execution of unauthorized scripts.
✅ Monitoring system logs for suspicious activity.
This repository is intended for educational and research purposes only. The techniques demonstrated here are meant to assist cybersecurity professionals in identifying and mitigating security risks.
🔴 Unauthorized use of these techniques on systems you do not own or have explicit permission to test is illegal and unethical.
🔴 The author is not responsible for any misuse or damage caused by the use of these scripts.
By using this repository, you agree that you are solely responsible for your actions and will not use this information for malicious or illegal activities.