From 1e85de5b12e2641505c189537e855fcb9376fa35 Mon Sep 17 00:00:00 2001 From: Victor Ramos Mello <772792+m0nad@users.noreply.github.com> Date: Thu, 11 Jan 2024 07:30:40 +0000 Subject: [PATCH] Add Windows Local Privilege Escalation Cookbook by nickvourd --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index dd5bff8..650bed8 100644 --- a/README.md +++ b/README.md @@ -131,6 +131,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info - [Privilege escalation: Windows](https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-windows) - [Windows elevation of privileges ToC](https://guif.re/windowseop) - [Windows Local Privilege Escalation](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation): by HackTricks + - [Windows Local Privilege Escalation Cookbook](https://github.com/nickvourd/Windows-Local-Privilege-Escalation-Cookbook): Windows Local Privilege Escalation Cookbook by nickvourd. - [Windows Post Gather Modules](https://www.offensive-security.com/metasploit-unleashed/windows-post-gather-modules/): Metasploit offers a number of post exploitation modules that allow for further information gathering on your target network. - [Windows Priv Esc](https://www.sock-raw.org/wiki/doku.php/windows_priv_esc) - [Windows Privilege Escalation Fundamentals](https://www.fuzzysecurity.com/tutorials/16.html)