Windows
AlwaysInstallElevatedAutomationAutorunsCredential TheftCredentials from SoftwareDLL HijackingDPAPI credentials extractionDump SAM and SYSTEM hivesEnable All TokensEnable RDP Access to bypass UACHandy CommandsHot PotatoIIS Internet Information ServicesInitial EnumerationInsecure Service PermissionsKernel ExploitsLocal Admin Privileges Elevation One-LinerPassword Mining - MemoryPotato ExploitsPowerUpPowershell HistoryRecover privileges of NT Authority Local Service AccountRegistryRunasSaved Windows CredentialsScheduled TasksService MisconfigurationsSticky Notes Privilege EscalationSymlinksUnattended Windows InstallationsUnpatched SoftwareExample:User Account Control (UAC) BypassWerTrigger Exploit Privileged MySQL Service File OverwriteWindows Local Password AttacksWindows PrivilegesWindows Subsystem Linux (WSL)XAMPP Privilege Escalation
Last updated