Tools

It is always a safe bet to upload tools to C:\Windows\Temp because the BUILTIN\Users group has write access.

LOLBAS

The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.

[LINK]

Snaffler

Snaffler is a tool for pentesters and red teamers to help find delicious candy needles (creds mostly, but it's flexible) in a bunch of horrible boring haystacks (a massive Windows/AD environment).

[LINK]

Seatbelt

C# project for performing a wide variety of local privilege escalation checks

[LINK]

WinPEAS

WinPEAS is a script that searches for possible paths to escalate privileges on Windows hosts.

[LINK]

PowerUP

PowerShell script for finding common Windows privilege escalation vectors that rely on misconfigurations. It can also be used to exploit some of the issues found.

[LINK]

SharpUp

C# version of PowerUp. Very useful tool to check for service binaries suffering from weak ACLs.

PS C:\> .\SharpUp.exe audit

[LINK]

JAWS

PowerShell script for enumerating privilege escalation vectors written in PowerShell 2.0

[LINK]

SessionGopher

PowerShell tool to find and decrypt saved session info for remote access tools like PuTTY, WinSCP, FileZilla, and RDP.

[LINK]

Watson

.NET tool to identify missing patches and suggest privilege escalation exploits.

[LINK]

LaZagne

Python tool which extracts locally stored passwords from browsers, chat tools, databases, Wi-Fi configs, and more.

Windows Exploit Suggester - NG

Python / Powershell tool that analyzes the output of Windows' systeminfo to identify OS vulnerabilities, including associated exploits. It supports all Windows versions from XP to Windows 10, including server editions, making it useful for pinpointing specific security weaknesses.

[LINK]

Sysinternals Suite

Includes tools like AccessChk, PipeList, and PsService for system enumeration.

[LINK]

Last updated