Windows Privilege Escalation

Tools

    • Windows Exploit Suggester

      Windows Privesc Check 2.0

    • PowerUp

      • Windows Privilege Escalation through Powershell
    • ElevateKit

      • The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
    • kernelpop

      • kernel privilege escalation enumeration and exploitation framework
    • BeRoot
    • Pompem
      • Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. In the current version, it performs searches in PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan Vulnerability Database
    • AccessChk
      • As a part of ensuring that they've created a secure environment Windows administrators often need to know what kind of accesses specific users or groups have to resources including files, directories, Registry keys, global objects and Windows services. AccessChk quickly answers these questions with an intuitive interface and output.
    • AutoDane at BSides Cape Town
    • Auto DANE
      • Auto DANE attempts to automate the process of exploiting, pivoting and escalating privileges on windows domains.
  • Misc Privilege Escalation

MORE TOOLS

Windows Privilege check

  1. https://github.com/pentestmonkey/windows-privesc-check
  2. https://github.com/minisllc/red-team-scripts
  3. https://github.com/dzonerzy/winescalation
  4. https://github.com/pentestmonkey/windows-privesc-check
  5. https://github.com/brianwrf/WinSystemHelper

Guide and walkthrough

results matching ""

    No results matching ""