Batch file to help automate Windows enumeration for privilege escalation
☆91Sep 25, 2016Updated 9 years ago
Alternatives and similar repositories for windowsEnum
Users that are interested in windowsEnum are comparing it to the libraries listed below
Sorting:
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Damn Vulnerable File Upload V 1.1☆102May 26, 2018Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆173Aug 15, 2025Updated 6 months ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆627Jun 8, 2018Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,504Aug 1, 2023Updated 2 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- Windows batch script that finds misconfiguration issues which can lead to privilege escalation.☆673Dec 1, 2024Updated last year
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Sep 26, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Python wrapper for FileLocator Pro Searches☆12Feb 17, 2020Updated 6 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago