mirror of
https://github.com/m0nad/awesome-privilege-escalation.git
synced 2024-12-22 05:44:59 -05:00
Add Seatbelt to Windows Tools
This commit is contained in:
parent
1eab9f9bb8
commit
d493d4c54a
@ -174,6 +174,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info
|
||||
- [RoguePotato](https://github.com/antonioCoco/RoguePotato): Another Windows Local Privilege Escalation from Service Account to System by splinter_code/antonioCoco
|
||||
- [RottenPotato](https://github.com/foxglovesec/RottenPotato): RottenPotato local privilege escalation from service account to SYSTEM. (No longer maintained)
|
||||
- [RottenPotatoNG](https://github.com/breenmachine/RottenPotatoNG): New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.
|
||||
- [Seatbelt](https://github.com/GhostPack/Seatbelt): Project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
|
||||
- [SessionGopher](https://github.com/Arvanaghi/SessionGopher): SessionGopher is a PowerShell tool that finds and decrypts saved session information for remote access tools.
|
||||
- [Sherlock](https://github.com/rasta-mouse/Sherlock/): PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. (Deprecated)
|
||||
- [SweetPotato](https://github.com/CCob/SweetPotato): Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019 by CCob
|
||||
|
Loading…
Reference in New Issue
Block a user