References
Some resources links
Windows Privilege escalation Automated Tool
dirsearch - Web path discovery Current Release: v0.4.2 (2021.9.12)https://github.com/maurosoria/dirsearch
Chisel (a fast TCP/UDP tunnel) - https://github.com/jpillora/chisel
WinPEAS - https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS
Windows PrivEsc Checklist - https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation
Sherlock - https://github.com/rasta-mouse/Sherlock
Watson - https://github.com/rasta-mouse/Watson
PowerUp - https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc
JAWS - https://github.com/411Hall/JAWS
Windows Exploit Suggester - https://github.com/AonCyberLabs/Windows-Exploit-Suggester
Metasploit Local Exploit Suggester - https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/
Seatbelt - https://github.com/GhostPack/Seatbelt
SharpUp - https://github.com/GhostPack/SharpUp
Windows XP SP0/SP1 privilege escalation to the system
https://sohvaxus.github.io/content/winxp-sp1-privesc.html
Windows Privilege Escalation Fundamentals https://www.fuzzysecurity.com/tutorials/16.html
AD attack references
https://0xdf.gitlab.io/tags#active-directory
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
Last updated
Was this helpful?