😁
Try Harder Journey
  • About this Journey
  • Recon/Enumeration
  • Exploitation
    • Apache Exploitations
      • Log4j vuln CVE-2021-44228
  • Privilege Escalation
  • Linux/Unix
  • Reverse Shell CheatSheet
  • BOF
    • TryHackMe BOF Prep
  • Port Forwarding
  • File Transfer
  • Proof
  • Report
  • Python
  • AD Attack
    • HTB AD
      • HTB: Reel 10 Nov 2018
      • HTB: Active 08 Dec 2018
    • THM AD
    • Cheatsheets Notes
  • Cloud
    • Zero Trust
    • Azure
    • AWS
    • GCP
  • OSINT
  • Web Application
    • File upload vulnerabilities
      • Tryhackme File Upload Vulnerabilities
      • Web Security Academy File upload Vulnerabilities
      • Bypass Disable Functions (THM WT)
  • HTB
    • Blocky HTB Walkthrough
  • References
Powered by GitBook
On this page

Was this helpful?

References

Some resources links

PreviousBlocky HTB Walkthrough

Last updated 3 years ago

Was this helpful?

Windows Privilege escalation Automated Tool

dirsearch - Web path discovery Current Release: v0.4.2 (2021.9.12)

Chisel (a fast TCP/UDP tunnel) -

WinPEAS -

Windows PrivEsc Checklist -

Sherlock -

Watson -

PowerUp -

JAWS -

Windows Exploit Suggester -

Metasploit Local Exploit Suggester -

Seatbelt -

SharpUp -

Windows XP SP0/SP1 privilege escalation to the system

Windows Privilege Escalation Fundamentals

AD attack references

https://github.com/maurosoria/dirsearch
https://github.com/jpillora/chisel
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS
https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation
https://github.com/rasta-mouse/Sherlock
https://github.com/rasta-mouse/Watson
https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc
https://github.com/411Hall/JAWS
https://github.com/AonCyberLabs/Windows-Exploit-Suggester
https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/
https://github.com/GhostPack/Seatbelt
https://github.com/GhostPack/SharpUp
https://sohvaxus.github.io/content/winxp-sp1-privesc.html
https://www.fuzzysecurity.com/tutorials/16.html
https://0xdf.gitlab.io/tags#active-directory
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/CroweCybersecurity/ad-ldap-enum