frizb / Windows-Privilege-Escalation
Windows Privilege Escalation Techniques and Scripts
☆818Updated 4 years ago
Alternatives and similar repositories for Windows-Privilege-Escalation:
Users that are interested in Windows-Privilege-Escalation are comparing it to the libraries listed below
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆527Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,563Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆475Updated 4 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,126Updated 5 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,468Updated 2 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,491Updated last year
- SharpUp is a C# port of various PowerUp functionality.☆1,296Updated 11 months ago
- Windows Local Privilege Escalation from Service Account to System☆725Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,114Updated last month
- JAWS - Just Another Windows (Enum) Script☆1,723Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,211Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆1,058Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆558Updated 8 months ago
- Good For OSCP Training☆437Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆688Updated 4 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,048Updated last year
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆818Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆1,486Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆1,910Updated 4 years ago
- Extract credentials from lsass remotely☆2,079Updated 2 weeks ago
- pwning IPv4 via IPv6☆1,747Updated 10 months ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆782Updated 3 weeks ago
- Various PowerShell scripts that may be useful during red team exercise☆937Updated 2 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,265Updated 2 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆728Updated 7 months ago
- Collection of things made during my OSCP journey☆935Updated 2 years ago
- Search gtfobins and lolbas files from your terminal☆456Updated 2 years ago
- Cheat sheets for various projects.☆1,046Updated 7 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆616Updated 3 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆962Updated 7 years ago