😁
Try Harder Journey
CtrlK
  • About this Journey
  • Recon/Enumeration
  • Exploitation
    • Apache Exploitations
      • Log4j vuln CVE-2021-44228
  • Privilege Escalation
  • Linux/Unix
  • Reverse Shell CheatSheet
  • BOF
    • TryHackMe BOF Prep
  • Port Forwarding
  • File Transfer
  • Proof
  • Report
  • Python
  • AD Attack
    • HTB AD
      • HTB: Reel 10 Nov 2018
      • HTB: Active 08 Dec 2018
    • THM AD
    • Cheatsheets Notes
  • Cloud
    • Zero Trust
    • Azure
    • AWS
    • GCP
  • OSINT
  • Web Application
    • File upload vulnerabilities
      • Tryhackme File Upload Vulnerabilities
      • Web Security Academy File upload Vulnerabilities
      • Bypass Disable Functions (THM WT)
  • HTB
    • Blocky HTB Walkthrough
  • References
Powered by GitBook
On this page

Was this helpful?

References

Some resources links

Windows Privilege escalation Automated Tool

dirsearch - Web path discovery Current Release: v0.4.2 (2021.9.12)https://github.com/maurosoria/dirsearch

Chisel (a fast TCP/UDP tunnel) - https://github.com/jpillora/chisel

WinPEAS - https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS

Windows PrivEsc Checklist - https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation

Sherlock - https://github.com/rasta-mouse/Sherlock

Watson - https://github.com/rasta-mouse/Watson

PowerUp - https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc

JAWS - https://github.com/411Hall/JAWS

Windows Exploit Suggester - https://github.com/AonCyberLabs/Windows-Exploit-Suggester

Metasploit Local Exploit Suggester - https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/

Seatbelt - https://github.com/GhostPack/Seatbelt

SharpUp - https://github.com/GhostPack/SharpUp

Windows XP SP0/SP1 privilege escalation to the system

https://sohvaxus.github.io/content/winxp-sp1-privesc.html

Windows Privilege Escalation Fundamentals https://www.fuzzysecurity.com/tutorials/16.html

AD attack references

https://0xdf.gitlab.io/tags#active-directory

https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

https://github.com/CroweCybersecurity/ad-ldap-enum

PreviousBlocky HTB Walkthrough

Last updated 3 years ago

Was this helpful?