Windows priviledge escalation script
☆13Feb 1, 2025Updated last year
Alternatives and similar repositories for win_privesc
Users that are interested in win_privesc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 19, 2025Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 5 months ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Apr 25, 2022Updated 3 years ago
- Find CVEs associated to Linux and public exploits on github☆120Apr 10, 2025Updated 11 months ago
- Send Emails using Bash in Synology☆12Jul 1, 2023Updated 2 years ago
- Random scripts that I used in the CARTP course lab & final exam.☆14Feb 28, 2024Updated 2 years ago
- Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.☆21Sep 24, 2023Updated 2 years ago
- Script for automating multiple word files to be used with Hashcat☆11Apr 9, 2024Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆37Nov 25, 2025Updated 4 months ago
- ☆15May 2, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆41Jan 23, 2026Updated 2 months ago
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- Repo of General Conference addresses☆11Oct 9, 2025Updated 5 months ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Simple Script Use cfscrape Module, Connect Proxies To Bypass CF☆23Jun 11, 2020Updated 5 years ago
- ☆37Jun 20, 2025Updated 9 months ago
- ☆28Nov 3, 2024Updated last year
- ☆48Jul 30, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Advance DDOS attack detector tool written completely on Python3☆28Jun 11, 2022Updated 3 years ago
- This Python script takes a hexadecimal string of digital binary data (from the two tracks of a debit card barcode) and obtains serial, ac…☆12Aug 4, 2020Updated 5 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- Collection of hashcat lists and things.☆50Dec 18, 2019Updated 6 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- A proof-of-concept for ransomware encryption☆18Nov 29, 2025Updated 4 months ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆19Apr 10, 2022Updated 3 years ago
- Mockingjay process self injection POC☆50Aug 8, 2023Updated 2 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 4 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Jul 27, 2022Updated 3 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago