githubEdit

Overview

Guides

Manual

Current users privs

Current user details (all)

List users

User details

List other logged in users

List user groups

Group details

Add user (interactive, requires user interaction)

Add user (non-interactive)

Add user to group (e.g. administrators)

Change password

System info

Patch level

Network connections

Scheduled tasks

Driver

Installed software (slow)

Alternative

Services

Antivirus

Searching files

DLL hijacking

Find a program with a missing dll, or make use for search path order, to execute your own dll.

Unquoted service path

Finding unqoated service paths

Check if we have write permission in a suitable path.

PowerShell

SMB

Mount smb share

Access with

Automated

Exploit Suggester

This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. GitHub - AonCyberLabs/Windows-Exploit-Suggesterarrow-up-right Windows Exploit Suggester - Next Generation (WES-NG)arrow-up-right

winPEAS

winPEASarrow-up-right

PowerSploit

PowerSploit

JAWS

JAWS

Watson

Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities GitHub - rasta-mouse/Watsonarrow-up-right

Seatbelt

Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives. GitHub - GhostPack/Seatbeltarrow-up-right

Sherlock

Deprecated. Have a look at Watsonarrow-up-right instead.

PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. GitHub - rasta-mouse/Sherlockarrow-up-right

Misc

File inside a file

Run as

Weak services

Replace files/programs running with SYSTEM permissions with exploited ones -> Check permissions icacls <file>

Last updated