You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you find yourself stuck on a windows system with no internet access - no problem at all, just use Offline_Winpwn.ps1, all scripts and executables are included.
* MS15-077 - (XP/Vista/Win7/Win8/2000/2003/2008/2012) x86 only!
57
+
* MS16-032 - (2008/7/8/10/2012)!
58
+
* MS16-135 - (WS2k16 only)!
59
+
*CVE-2018-8120 - May 2018, Windows 7 SP1/2008 SP2,2008 R2 SP1!
60
+
*CVE-2019-0841 - April 2019!
61
+
*CVE-2019-1069 - Polarbear Hardlink, Credentials needed - June 2019!
62
+
*CVE-2019-1129/1130 - Race Condition, multiples cores needed - July 2019!
63
+
*CVE-2019-1215 - September 2019 - x64 only!
64
+
*CVE-2020-0638 - February 2020 - x64 only!
65
+
* Juicy-Potato Exploit
66
+
*#### `UACBypass` ->
67
+
* UAC Magic, Based on James Forshaw's three part post on UAC
68
+
* UAC Bypass cmstp technique, by Oddvar Moe
69
+
* DiskCleanup UAC Bypass, by James Forshaw
70
+
* DccwBypassUAC technique, by Ernesto Fernandez and Thomas Vanhoutte
55
71
*#### `shareenumeration` -> Invoke-Filefinder and Invoke-Sharefinder (Powerview / Powersploit)
56
72
*#### `groupsearch` -> Get-DomainGPOUserLocalGroupMapping - find Systems where you have Admin-access or RDP access to via Group Policy Mapping (Powerview / Powersploit)
57
73
*#### `Kerberoasting` -> Executes Invoke-Kerberoast in a new window and stores the hashes for later cracking
58
74
*#### `powerSQL` -> SQL Server discovery, Check access with current user, Audit for default credentials + UNCPath Injection Attacks
59
-
*#### `Sharphound` -> Downloads Sharphound and collects Information for the Bloodhound DB
75
+
*#### `Sharphound` -> Bloodhound 3.0 Report
60
76
*#### `adidnswildcard` -> Create a Active Directory-Integrated DNS Wildcard Record
61
77
*#### `MS17-10` -> Scan active windows Servers in the domain or all systems for MS17-10 (Eternalblue) vulnerability
62
78
*#### `Sharpcradle` -> Load C# Files from a remote Webserver to RAM
@@ -85,7 +101,7 @@ Functions available after Import:
Usage of WinPwn for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.
0 commit comments