# Privilege Escalation

* [Primary Access Token Manipulation](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/primary-access-token-manipulation)
* [Windows NamedPipes 101 + Privilege Escalation](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/windows-namedpipes-101-+-privilege-escalation)
* [DLL Hijacking](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/dll-injection)
* [WebShells](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/webshells)
* [Image File Execution Options Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/image-file-execution-options-injection)
* [Unquoted Service Paths](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/unquoted-service-paths)
* [Pass The Hash: Privilege Escalation with Invoke-WMIExec](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/pass-the-hash-privilege-escalation-with-invoke-wmiexec)
* [Environment Variable $Path Interception](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/environment-variable-usdpath-interception)
* [Weak Service Permissions](https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/weak-service-permissions)
