☆348Dec 25, 2022Updated 3 years ago
Alternatives and similar repositories for Windows-Privilege-Escalation
Users that are interested in Windows-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- This repository contains the files that provide the upload functionality in the IIS Server☆34Aug 4, 2021Updated 4 years ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆860Oct 23, 2022Updated 3 years ago
- ☆248Oct 23, 2022Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Nov 7, 2020Updated 5 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆724Jun 24, 2025Updated 8 months ago
- ☆140Oct 23, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Mar 30, 2021Updated 4 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆483May 8, 2025Updated 9 months ago
- ☆346Oct 23, 2022Updated 3 years ago
- ☆210Oct 23, 2022Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,462Nov 16, 2024Updated last year
- ☆439Oct 23, 2022Updated 3 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆472Oct 23, 2022Updated 3 years ago
- ☆22Jun 19, 2025Updated 8 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,201Oct 23, 2022Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,542Feb 11, 2023Updated 3 years ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,664Jun 22, 2025Updated 8 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,717Mar 24, 2023Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆378Jul 30, 2023Updated 2 years ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆38May 1, 2024Updated last year
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 2 months ago
- Windows Local Privilege Escalation Cookbook☆1,281Feb 5, 2026Updated last month
- OSWE, OSEP, OSED, OSEE☆3,767Jan 2, 2026Updated 2 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Oct 29, 2025Updated 4 months ago
- Tools & Interesting Things for RedTeam Ops☆2,256Feb 10, 2026Updated 3 weeks ago
- ☆1,698Aug 19, 2022Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 9 months ago
- ☆300Jan 3, 2024Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆82Jul 21, 2022Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆820Oct 23, 2022Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆201Jun 25, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago