Basics of Windows privilege escalation
☆134Sep 30, 2017Updated 8 years ago
Alternatives and similar repositories for Windows-Privesc
Users that are interested in Windows-Privesc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,004Jan 15, 2019Updated 7 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- ☆12Oct 16, 2017Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.☆168Jun 10, 2021Updated 4 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,536Mar 23, 2023Updated 3 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,499Aug 1, 2023Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Web of trust grapher☆40Feb 25, 2026Updated last month
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- Exchange privilege escalations to Active Directory☆810Apr 23, 2023Updated 2 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,995Oct 10, 2018Updated 7 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,188Dec 11, 2022Updated 3 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,917Sep 7, 2020Updated 5 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆565Aug 17, 2020Updated 5 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- ☆15May 17, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago