Tools
It is always a safe bet to upload tools to C:\Windows\Temp
because the BUILTIN\Users
group has write access.
LOLBAS
LOLBAS
The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.
Snaffler
Snaffler
Snaffler is a tool for pentesters and red teamers to help find delicious candy needles (creds mostly, but it's flexible) in a bunch of horrible boring haystacks (a massive Windows/AD environment).
Seatbelt
Seatbelt
C# project for performing a wide variety of local privilege escalation checks
WinPEAS
WinPEAS
WinPEAS is a script that searches for possible paths to escalate privileges on Windows hosts.
PowerUP
PowerUP
PowerShell script for finding common Windows privilege escalation vectors that rely on misconfigurations. It can also be used to exploit some of the issues found.
SharpUp
SharpUp
C# version of PowerUp. Very useful tool to check for service binaries suffering from weak ACLs.
JAWS
JAWS
PowerShell script for enumerating privilege escalation vectors written in PowerShell 2.0
SessionGopher
SessionGopher
PowerShell tool to find and decrypt saved session info for remote access tools like PuTTY, WinSCP, FileZilla, and RDP.
Watson
Watson
.NET tool to identify missing patches and suggest privilege escalation exploits.
LaZagne
LaZagne
Python tool which extracts locally stored passwords from browsers, chat tools, databases, Wi-Fi configs, and more.
Windows Exploit Suggester - NG
Windows Exploit Suggester - NG
Python / Powershell tool that analyzes the output of Windows' systeminfo
to identify OS vulnerabilities, including associated exploits. It supports all Windows versions from XP to Windows 10, including server editions, making it useful for pinpointing specific security weaknesses.
Sysinternals Suite
Sysinternals Suite
Includes tools like AccessChk, PipeList, and PsService for system enumeration.
Last updated