Search

Exploring Automated Tools

Executables:

winPEAS.exe
Seatbelt.exe (compile)
Watson.exe (compile)
SharpUp.exe (compile)

PowerShell:

Sherlock.ps1
PowerUp.ps1
jaws-enum.ps1

Other:

windows-exploit-suggester.py (local) wes.py****
Exploit Suggester (Metasploit)
WinpeasPowerShell

Links:

Resources for this video:

WinPEAS - https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS

Windows PrivEsc Checklist - https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation

Sherlock - https://github.com/rasta-mouse/Sherlock

Watson - https://github.com/rasta-mouse/Watson

PowerUp - https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc

JAWS - https://github.com/411Hall/JAWS

Windows Exploit Suggester - https://github.com/AonCyberLabs/Windows-Exploit-Suggester

Metasploit Local Exploit Suggester - https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/

Seatbelt - https://github.com/GhostPack/Seatbelt

SharpUp - https://github.com/GhostPack/SharpUp

Windows Exploit SuggesterOld SuggesterNew Suggester