Basics of Windows privilege escalation
☆134Sep 30, 2017Updated 8 years ago
Alternatives and similar repositories for Windows-Privesc
Users that are interested in Windows-Privesc are comparing it to the libraries listed below
Sorting:
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,003Jan 15, 2019Updated 7 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- ☆15May 17, 2018Updated 7 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.☆168Jun 10, 2021Updated 4 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆1,533Mar 23, 2023Updated 2 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,504Aug 1, 2023Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆842Jun 25, 2024Updated last year
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Pop shells like a master.☆1,489Apr 2, 2019Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,184Dec 11, 2022Updated 3 years ago