Tools
Last updated
Last updated
Tool | Description |
---|---|
C# project for performing a wide variety of local privilege escalation checks | |
WinPEAS is a script that searches for possible paths to escalate privileges on Windows hosts. All of the checks are explained here | |
PowerShell script for finding common Windows privilege escalation vectors that rely on misconfigurations. It can also be used to exploit some of the issues found | |
C# version of PowerUp | |
PowerShell script for enumerating privilege escalation vectors written in PowerShell 2.0 | |
SessionGopher is a PowerShell tool that finds and decrypts saved session information for remote access tools. It extracts PuTTY, WinSCP, SuperPuTTY, FileZilla, and RDP saved session information | |
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities. | |
Tool used for retrieving passwords stored on a local machine from web browsers, chat tools, databases, Git, email, memory dumps, PHP, sysadmin tools, wireless network configurations, internal Windows password storage mechanisms, and more | |
WES-NG is a tool based on the output of Windows' | |
Python implementation of Seatbelt
Also on my github