togie6 / Windows-Privesc
Basics of Windows privilege escalation
☆133Updated 7 years ago
Alternatives and similar repositories for Windows-Privesc:
Users that are interested in Windows-Privesc are comparing it to the libraries listed below
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Some of the scripts I use.☆41Updated 8 years ago
- ☆52Updated 4 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- Various Cheat Sheets☆181Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- ☆122Updated 7 years ago
- For all your network pentesting needs☆154Updated 10 months ago
- Domain user enumeration tool☆215Updated last year
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆183Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Penetration testing scripts☆142Updated 6 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- ☆93Updated 7 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- MS17-010☆63Updated 7 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 5 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆12Updated 9 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago