rasta-mouse / SherlockLinks
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
☆1,969Updated 7 years ago
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below
Sorting:
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,506Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,652Updated 5 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,591Updated last year
- JAWS - Just Another Windows (Enum) Script☆1,900Updated 4 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,701Updated 4 years ago
- ☆1,480Updated 2 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,616Updated last year
- SMBMap is a handy SMB enumeration tool☆1,993Updated 3 weeks ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,856Updated last month
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,909Updated 5 years ago
- PowerShell Pass The Hash Utils☆1,697Updated 7 years ago
- Payload Generation Framework☆1,939Updated last year
- PowerTools is a collection of PowerShell projects with a focus on offensive operations.☆2,171Updated 3 years ago
- ODAT: Oracle Database Attacking Tool☆1,729Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,158Updated 2 years ago
- A tool to abuse Exchange services☆2,288Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,081Updated 4 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,503Updated 4 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,308Updated 3 years ago
- Cheat sheets for various projects.☆1,083Updated 8 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,334Updated 2 years ago
- pwning IPv4 via IPv6☆1,866Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,541Updated 3 years ago
- HTA encryption tool for RedTeams☆1,420Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,165Updated 4 months ago
- PowerShell Runspace Post Exploitation Toolkit☆1,552Updated 6 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,755Updated 3 years ago
- offsec batteries included☆1,579Updated last year
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,661Updated last year
- MS17-010☆2,221Updated 2 years ago