bars
4ack3r
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
Links & Tools
chevron-right
Links
Windows Priv Escalation
GitHub - bitsadmin/wesng: Windows Exploit Suggester - Next Generation
GitHub
chevron-right
FuzzySecurity | Windows Privilege Escalation Fundamentals
www.fuzzysecurity.com
chevron-right
Windows Privilege Escalation Guide
www.absolomb.com
chevron-right
Privilege Escalation - Windows · Total OSCP Guide
sushant747.gitbooks.io
chevron-right
PayloadsAllTheThings/Methodology and Resources/Windows - Privilege Escalation.md at master · swisskyrepo/PayloadsAllTheThings
GitHub
chevron-right
PEASS-ng/winPEAS at master · peass-ng/PEASS-ng
GitHub
chevron-right
Page not found - HackTricks
book.hacktricks.xyz
chevron-right
GitHub - rasta-mouse/Sherlock: PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
GitHub
chevron-right
GitHub - rasta-mouse/Watson: Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
GitHub
chevron-right
PowerSploit/Privesc at master · PowerShellMafia/PowerSploit
GitHub
chevron-right
GitHub - 411Hall/JAWS: JAWS - Just Another Windows (Enum) Script
GitHub
chevron-right
GitHub - strozfriedberg/Windows-Exploit-Suggester: This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
GitHub
chevron-right
https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/
blog.rapid7.com
chevron-right
GitHub - GhostPack/Seatbelt: Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
GitHub
chevron-right
GitHub - GhostPack/SharpUp: SharpUp is a C# port of various PowerUp functionality.
GitHub
chevron-right
Windows - Privilege Escalation - Internal All The Things
swisskyrepo.github.io
chevron-right
Impersonation Privileges
What happens when I type getsystem? | Cobalt Strike
Cobalt Strike
chevron-right
What happens when I type getsystem?
Previous
Links
chevron-left
Next
OSCP
chevron-right
Last updated
1 year ago