4ack3r
search
⌘Ctrlk
4ack3r
  • 4ack3r Field Guide
    • laptop-codeAbout
  • Exploits
    • Reverse shell
    • File Transfers
    • Buffer Overflow
    • Bruteforce
    • PHP rce
    • Compiling
    • msfvenom
    • Using ENV to escape Bad Characters
    • shellshock
    • Ncat Persistent Backdoor
    • CTF Exploits
  • Priviledge Escalation
    • Windows
      • Basic checks / powershell
      • Checklist - Local Windows Privilege Escalation
      • Resources
      • Tips and Tricks
      • Responder / SMB Relay
      • Attacking AD
      • Access
    • Linux
  • METASPLOIT
    • Basic Usage
    • Meterpreter
  • Vulnerabilities
    • SQL Injection Overview
    • NoSQL Injection
    • JavaScript Injection (XSS)
    • File Inclusion
    • Command Injection
    • XXE (XML external entity) Injections
    • Template Injection
    • Authentication
    • Cross-Site Request Forgery (CSRF)
    • Insecure Deserialization
    • Server-side request forgery (SSRF)
    • Insecure File Upload
    • Clickjacking
    • Open redirect
    • Vulnerable compnents
    • Race Conditions
    • Prototype Pollution
    • APIs
  • Scripts
    • get port from nmap
    • (DNS) zonetransfer_check.sh
  • Links & Tools
    • Searching
    • Payloads
    • Tools
    • YouTube
    • Learning
    • Practice
    • Links
  • And More
    • Popular Exploits
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Priviledge Escalationchevron-right
  2. Windows

Resources

LogoWindows - Privilege Escalation - Internal All The Thingsswisskyrepo.github.iochevron-right
Impersonation Privileges
Logolibpst | Kali Linux ToolsKali Linuxchevron-right
View pst files on Linux
Logomdbtools | Kali Linux ToolsKali Linuxchevron-right
Access MS Database on Linux

PreviousChecklist - Local Windows Privilege Escalationchevron-leftNextTips and Trickschevron-right

Last updated 1 year ago