🔥
AidenPearce369 HandBook
Ctrlk
  • SCANNING
  • ENUMERATION
  • AD PENTESTING
  • WINDOWS LOCAL PRIVILEGE ESCALATION
    • Find Local Admin Access
    • PowerShell Remoting
    • Service Unqouted Path
    • Modifiable Service
  • REVERSE SHELLS
  • TODO
Powered by GitBook
On this page
  • PowerUp
  • BeRoot
  • PrivEsc

WINDOWS LOCAL PRIVILEGE ESCALATION

PowerUp

https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Privesc/PowerUp.ps1

Invoke-AllChecks

BeRoot

https://github.com/AlessandroZ/BeRoot/releases

.\beRoot.exe

PrivEsc

https://raw.githubusercontent.com/enjoiz/Privesc/master/privesc.ps1

Invoke-PrivEsc
PreviousABUSING MS-SQL TRUSTNextFind Local Admin Access

Last updated 3 years ago