togie6 / Windows-Privesc
Basics of Windows privilege escalation
☆133Updated 7 years ago
Alternatives and similar repositories for Windows-Privesc:
Users that are interested in Windows-Privesc are comparing it to the libraries listed below
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- For all your network pentesting needs☆152Updated 8 months ago
- Learnings from OSCP and other random stuff.☆32Updated last year
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- ☆122Updated 7 years ago
- Domain user enumeration tool☆215Updated last year
- Penetration testing scripts☆141Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- ☆52Updated 4 years ago
- Windows Pentest Scripts☆229Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Various Cheat Sheets☆181Updated 3 years ago
- Some of the scripts I use.☆41Updated 7 years ago
- Custom tools and projects about security☆110Updated 3 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- ☆93Updated 7 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- MS17-010☆63Updated 7 years ago
- Collection of things made during my preparation to take on OSCE☆188Updated 3 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆261Updated 7 years ago
- ☆16Updated 6 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 7 years ago
- Pypykatz server☆125Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- locate and attack Lync/Skype for Business☆335Updated 5 months ago