frizb / Windows-Privilege-EscalationLinks
Windows Privilege Escalation Techniques and Scripts
☆887Updated 5 years ago
Alternatives and similar repositories for Windows-Privilege-Escalation
Users that are interested in Windows-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,606Updated 4 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆538Updated 3 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,188Updated 5 years ago
- SharpUp is a C# port of various PowerUp functionality.☆1,370Updated last year
- Simple php reverse shell implemented using binary .☆419Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,506Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,096Updated 4 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆891Updated 3 years ago
- JAWS - Just Another Windows (Enum) Script☆1,792Updated 4 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆812Updated 2 months ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆478Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,131Updated 7 months ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆745Updated last year
- Cheat sheets for various projects.☆1,061Updated 7 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,506Updated last year
- Windows Local Privilege Escalation from Service Account to System☆821Updated 5 years ago
- Collection of things made during my OSCP journey☆944Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,273Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆563Updated last year
- PowerShell Pass The Hash Utils☆1,605Updated 6 years ago
- pwning IPv4 via IPv6☆1,812Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆2,024Updated 4 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,096Updated 2 years ago
- Good For OSCP Training☆437Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,510Updated 2 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆607Updated 9 months ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,541Updated 6 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,125Updated 2 years ago
- Windows AV Evasion☆793Updated 5 years ago
- Extract credentials from lsass remotely☆2,127Updated 2 months ago