Windows Privilege Escalation Tool
☆20Dec 30, 2025Updated 3 months ago
Alternatives and similar repositories for alpha-wpes
Users that are interested in alpha-wpes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jan 20, 2026Updated 2 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- ☆20May 1, 2023Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆45Mar 12, 2026Updated 3 weeks ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- ☆27May 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆19Jul 23, 2025Updated 8 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- ☆29Jun 18, 2025Updated 9 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 3 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆12Jan 15, 2024Updated 2 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆22Jun 17, 2025Updated 9 months ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- simple ham radio fox for esp32 / SA868☆22Aug 3, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆16Aug 31, 2023Updated 2 years ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- My dotfiles for zsh, vim, i3, polybar, alacritty ...☆25Jan 20, 2026Updated 2 months ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago