References

Some resources links

Windows Privilege escalation Automated Tool

dirsearch - Web path discovery Current Release: v0.4.2 (2021.9.12)https://github.com/maurosoria/dirsearcharrow-up-right

Chisel (a fast TCP/UDP tunnel) - https://github.com/jpillora/chiselarrow-up-right

WinPEAS - https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEASarrow-up-right

Windows PrivEsc Checklist - https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalationarrow-up-right

Sherlock - https://github.com/rasta-mouse/Sherlockarrow-up-right

Watson - https://github.com/rasta-mouse/Watsonarrow-up-right

PowerUp - https://github.com/PowerShellMafia/PowerSploit/tree/master/Privescarrow-up-right

JAWS - https://github.com/411Hall/JAWSarrow-up-right

Windows Exploit Suggester - https://github.com/AonCyberLabs/Windows-Exploit-Suggesterarrow-up-right

Metasploit Local Exploit Suggester - https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/arrow-up-right

Seatbelt - https://github.com/GhostPack/Seatbeltarrow-up-right

SharpUp - https://github.com/GhostPack/SharpUparrow-up-right

Windows XP SP0/SP1 privilege escalation to the system

https://sohvaxus.github.io/content/winxp-sp1-privesc.htmlarrow-up-right

Windows Privilege Escalation Fundamentals https://www.fuzzysecurity.com/tutorials/16.htmlarrow-up-right

AD attack references

https://0xdf.gitlab.io/tags#active-directoryarrow-up-right

https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheetarrow-up-right

https://github.com/CroweCybersecurity/ad-ldap-enumarrow-up-right

Last updated

Was this helpful?