Windows Privilege Escalation Tool
☆20Dec 30, 2025Updated 4 months ago
Alternatives and similar repositories for alpha-wpes
Users that are interested in alpha-wpes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 11 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆18Jun 3, 2025Updated 11 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- ☆20May 1, 2023Updated 3 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆16Jul 17, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆10Aug 17, 2023Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- ☆27May 1, 2023Updated 3 years ago
- Critical Assessment of Intrinsic Disorder☆17Aug 11, 2025Updated 9 months ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆48Mar 12, 2026Updated 2 months ago
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆19Jul 23, 2025Updated 9 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- ☆29Jun 18, 2025Updated 11 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 3 years ago
- BOF template with boflink and mutator kit support☆51Jan 8, 2026Updated 4 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆17Aug 31, 2023Updated 2 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- My dotfiles for zsh, vim, i3, polybar, alacritty ...☆25May 12, 2026Updated last week
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Privilege escalation vulnerability on ASKEY routers☆10Jan 30, 2023Updated 3 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 10 months ago