Powershell script to automate finding privilege escalation vectors in windows environments.
☆16Nov 30, 2019Updated 6 years ago
Alternatives and similar repositories for WinEnum
Users that are interested in WinEnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C++ Script to Create "Obfuscated Native ShellCode Launcher" #Obfuscator #Shellcode #Generator☆13Apr 3, 2021Updated 5 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆19Dec 23, 2020Updated 5 years ago
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆32Jun 28, 2022Updated 3 years ago
- .NET executable packer☆62Nov 4, 2018Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 4 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago
- The GTK Keylogger☆18Aug 11, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- upx变种☆15Aug 2, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A sample Server/Client game writen with C#. This application uses a custom message protocol on TCPClient & TCPListener with asynchronous☆11May 17, 2019Updated 6 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Aug 10, 2020Updated 5 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- init☆14Mar 16, 2020Updated 6 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 2 months ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago