Windows Tools
Seatbelt
Description: C# tool for performing a wide variety of local privilege escalation checks.
GitHub: Seatbelt
winPEAS
Description: PowerShell script that searches for possible paths to escalate privileges on Windows hosts.
GitHub: winPEAS
PowerUp
Description: PowerShell script for finding common Windows privilege escalation vectors, particularly relying on misconfigurations.
GitHub: PowerUp
SharpUp
Description: C# version of PowerUp that identifies privilege escalation vectors.
GitHub: SharpUp
JAWS
Description: PowerShell script for enumerating privilege escalation vectors, compatible with PowerShell 2.0.
GitHub: JAWS
SessionGopher
Description: PowerShell tool that finds and decrypts saved session information for remote access tools like PuTTY and WinSCP.
GitHub: SessionGopher
Watson
Description: .NET tool designed to enumerate missing security updates (KBs) and suggest exploits for privilege escalation.
GitHub: Watson
LaZagne
Description: Tool for retrieving passwords stored on a local machine, including browsers, chat tools, databases, and more.
GitHub: LaZagne
Windows Exploit Suggester - Next Generation (WES-NG)
Description: Tool based on
systeminfo
output, suggesting vulnerabilities and exploits for the OS version.GitHub: WES-NG
Sysinternals Suite
Description: A suite of tools, including AccessChk, PipeList, and PsService, for system enumeration.
Official Website: Sysinternals Suite
Last updated