enjoiz / PrivescLinks
Windows batch script that finds misconfiguration issues which can lead to privilege escalation.
☆625Updated 9 months ago
Alternatives and similar repositories for Privesc
Users that are interested in Privesc are comparing it to the libraries listed below
Sorting:
- Exchange privilege escalations to Active Directory☆785Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆740Updated 3 years ago
- Tool to audit and attack LAPS environments☆897Updated 7 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆1,030Updated 5 months ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆611Updated 2 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆837Updated 3 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,204Updated 6 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,365Updated 2 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆517Updated 2 years ago
- Microsoft signed ActiveDirectory PowerShell module☆940Updated 5 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,285Updated 5 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆994Updated last month
- Various PowerShell scripts that may be useful during red team exercise☆950Updated 3 years ago
- NTLMv1 Multitool☆641Updated 2 weeks ago
- A Powershell Privilege Escalation Enumeration Script.☆312Updated 7 years ago
- ☆526Updated 2 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆842Updated 7 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆816Updated 5 months ago
- PowerShell Pass The Hash Utils☆1,641Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,515Updated 2 years ago
- Responder Windows Version Beta☆543Updated last year
- Malicious WMI Events using PowerShell☆390Updated 9 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,032Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆749Updated last year
- C# implementation of harmj0y's PowerView☆1,054Updated last year
- Generates malicious LNK file payloads for data exfiltration☆422Updated 8 years ago
- linikatz is a tool to attack AD on UNIX☆573Updated last year
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆887Updated 4 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,033Updated last year
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,276Updated 2 years ago