Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities

Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities

Related Repos

Kevin-Robertson Invoke-TheHash Invoke-TheHash contains PowerShell functions for performing pass the hash WMI and SMB tasks. WMI and SMB connections are accessed through the .NET TCPClient. Authentication is performed by passing an NTLM hash into

dnSpy dnSpy - Latest release - ❤️ Donate dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available. Main features: Debug .NET and Unity asse

A-mIn3 Description WINspect is part of a larger project for auditing different areas of Windows environments. It focuses on enumerating different parts of a Windows machine to identify sec

EslaMx7 Encrypt\Decrypt file(s) with AES 256-bit Description This is a personal tool i just made for a specific purpose (encrypt multiple files at once to securely backup them on a cloud service) then i decided to add some fea

peewpw Invoke-WCMDump PowerShell script to dump Windows credentials from the Credential Manager Invoke-WCMDump enumerates Windows credentials in the Credential Manager and then extracts available information about each one. Passwords a

win-acme Windows ACME Simple (WACS) A simple ACME client for Windows - for use with Let's Encrypt. (Formerly known as letsencrypt-win-simple (LEWS)) Overview Please check our website for an up-to-date overview, documentation

akalankauk Keep-It-Secure-File-Encryption Keep It Secure Is Private Data Encryption & Decryption Tool And Fully Open Source C# Project. Hash : 128 Byte | File Type : .ae Preview Features Custermize Fil

glinares CSCGuard Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation Usage CSCGuard is meant to be used in sandbox, analysis, or non-production environments. I simply have not tested en