Infosec Notes
search
⌘Ctrlk
Infosec Notes
  • power-offWork In Progress
  • diagram-projectNETWORKING
    • swapIP Addresses
    • arrows-crossMAC Addresses
    • jet-fighter-upTCP & UDP
    • plugCommon Ports & Protocols
    • layer-groupOSI Model
    • goal-netSubnetting
  • magnifying-glassEnumeration
    • screwdriver-wrenchTools
    • globeDNS Enumeration
  • skull-crossbonesEXPLOITATION
    • square-terminalShells
    • file-importPayloads
    • face-explodeMetasploit
    • pen-to-squareManual Exploitation
    • windowsWindows
    • databaseSQL Injection
    • arrows-crossXSS
    • terminalCommand Injection
    • cloud-arrow-upInsecure File Upload
    • lock-openAuthentication Attacks
    • file-spreadsheetXXE & XSLT Injection
    • location-dotLocal File Inclusion
    • windowsActive Directory
    • draw-polygonIDOR
  • escalatorPrivilege Escalation
    • linuxLinux
    • windowsWindows
      • magnifying-glassEnumeration
      • nfc-magnifying-glassNetwork Enumeration
      • key-skeletonPassword Hunting
      • virus-slashAV Enumeration
      • wand-sparklesAutomated Tools
      • microchipKernel Exploits
      • solar-systemGetsystem
      • person-running-fastRunAs
      • flag-checkeredStartup Applications
      • user-ninjaDDL Hijacking
      • binarybinPath
      • quotesUnquoted Service Paths
  • ufo-beamPOST-EXPLOITATION
    • cabinet-filingFile Transfers
    • unlockExtracting Passwords
    • keyboardMaintaining Access
  • code-branchLateral Movement
    • car-tunnelTunneling / Pivoting
    • foldersDiscovery
  • Pentesting
    • toolboxTools
    • linkLinks
    • File Inclusion
    • Privilege Escalation
    • Methods
    • Linux
    • Box Notes
    • Encoding / Decoding
    • Encryption
    • microchipModbus
    • awsAWS
  • mug-tea-saucerPOST-ENGAGEMENT
    • broom-wideCleanup
  • wifiWireless
    • square-infoOverview
    • screwdriver-wrenchTools
  • shield-keyholeDEFENSE
    • bin-bottles-recycleSIEM
  • brain-circuitMethodology
    • browserWeb Application Checklist
    • routerWireless
  • scale-balancedLegal
    • file-linesCommon Legal Documents
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. escalatorPrivilege Escalationchevron-right
  2. windowsWindows

wand-sparklesAutomated Tools

hashtag
EXE

  • WinPEAS: https://github.com/peass-ng/PEASS-ng/tree/master/winPEASarrow-up-right

  • Seatbelt: https://github.com/GhostPack/Seatbeltarrow-up-right

  • Watson: https://github.com/rasta-mouse/Watsonarrow-up-right

  • SharpUp: https://github.com/GhostPack/SharpUparrow-up-right

hashtag
PowerShell

  • Sherlock: https://github.com/rasta-mouse/Sherlockarrow-up-right

  • PowerUp: https://github.com/PowerShellMafia/PowerSploit/tree/master/Privescarrow-up-right

  • JAWS: https://github.com/411Hall/JAWSarrow-up-right

hashtag
Other

  • Windows Exploit Suggester (python): https://github.com/strozfriedberg/Windows-Exploit-Suggesterarrow-up-right

  • Metasploit Local Exploit Suggester

PreviousAV Enumerationchevron-leftNextKernel Exploitschevron-right

Last updated 1 month ago

  • EXE
  • PowerShell
  • Other