thesnoom / win-sec-checkLinks
Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.
☆11Updated 5 years ago
Alternatives and similar repositories for win-sec-check
Users that are interested in win-sec-check are comparing it to the libraries listed below
Sorting:
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆17Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 6 years ago
- ☆18Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- ☆17Updated 7 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- Random code snippets☆10Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- ☆20Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆16Updated 8 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago