carlospolop / winPEView external linksLinks
Windows privilege escalation with cmd
☆90Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for winPE
Users that are interested in winPE are comparing it to the libraries listed below
Sorting:
- System based on +500 blacklists to detect internet potencialy malicious hosts☆154Feb 8, 2026Updated last week
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- ☆30Mar 2, 2023Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Run several volatility plugins at the same time☆117Oct 27, 2022Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,657Nov 28, 2020Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- ☆12Apr 21, 2019Updated 6 years ago
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated 2 weeks ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- ☆26Jun 19, 2022Updated 3 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated last month
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Jul 30, 2020Updated 5 years ago
- Penetration testing course by Z0F.☆53Oct 6, 2021Updated 4 years ago
- Framework for C# development☆71Feb 2, 2026Updated last week
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago