Tool Reference
TOOOOOOOOOOLS :)
Sections Tool Reference
Enumeration & Situational Awareness
-
WinPEAS - Comprehensive automated enumeration
-
PowerUp - PowerShell-based privesc enumeration
-
Seatbelt - Detailed host survey and security configuration checks
-
PrivescCheck - PowerShell alternative to WinPEAS
-
SharpUp - C# version of PowerUp
-
accesschk - Sysinternals tool to check permissions
https://learn.microsoft.com/en-us/sysinternals/downloads/accesschk
Kernel Exploits & Exploit Suggesters
-
WES-NG (Windows Exploit Suggester) - Match systeminfo against known exploits
-
Watson - C# automated exploit suggestion (on-target)
-
Sherlock - PowerShell automated exploit suggestion (on-target)
-
PrintNightmare - Print Spooler service exploit (CVE-2021-1675 / CVE-2021-34527)
-
HiveNightmare (SeriousSAM) - Copy registry hives from shadow copies
-
Certipy - AD CS enumeration and exploitation
-
Windows Kernel Exploits Repository - Pre-compiled legacy exploits (MS16-032, MS15-051, MS14-058, MS11-046)
Service & Registry Exploits
-
SharpDLLProxy - Automate DLL forwarding for DLL hijacking
-
msfvenom - Payload generator for executable and DLL formats
Token & Potato Attacks
-
GodPotato - DCOM/RPCSS token impersonation
-
SweetPotato - Local Service to SYSTEM privesc using multiple combined methods
-
JuicyPotatoNG - Updated JuicyPotato utilizing DCOM
-
PrintSpoofer - Abuses Print Spooler service via named pipes
-
RoguePotato - Remote OXID resolver token impersonation
-
JuicyPotato - Legacy DCOM token impersonation for older systems
-
LocalPotato - NTLM local relay for arbitrary file read/write
-
CoercedPotato - Token impersonation via combined coercion methods
-
EfsPotato - EFS coercion with local named pipe impersonation
-
PetitPotam Local - Local variant of PetitPotam MS-EFSRPC coercion
-
KrbRelayUp - Kerberos relay with RBCD or Shadow Credentials for local privilege escalation
-
socat - Multipurpose relay utility for port forwarding
Privilege Abuse
-
EoPLoadDriver / ExploitCapcom - Toolset to load and exploit vulnerable kernel drivers
-
SeManageVolumeExploit - Abuse SeManageVolumePrivilege for raw disk read access
Post-Exploitation & Credentials
-
Impacket - Python toolkit for network protocols (smbserver, secretsdump)
-
Mimikatz - Windows credential extraction and ticket manipulation
-
pypykatz - Offline LSASS dump parser in Python
-
psgetsystem - Inject into SYSTEM process