The vulnerability could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does...
Search Results


local_exploit_suggester – Windows enum
Having a session already the next step is to escalate privileges. The next sample is going to show basic steps for Windows 1. Find about the target X86/windows 2. Scan for vulnerabilities run post/multi/recon/local_exploit_suggester For this demo, I will be using the...
Windows-Exploit-Suggester – Windows enum
This script is to find out about available exploits in Windows. Execution 1. Gather system information from meterpreter. execute -f => to run cmd commands cmd.exe /c systeminfo => open cmd and execute the command systeminfo >> systeminfo.txt => create a...
Sherlock & Empire – Loading modules into
Sherlock is a Powershell script to quickly find missing software patches for local privilege escalation vulnerabilities It can be loaded from Powershell or even loaded into Empire to be executed. https://github.com/rasta-mouse/Sherlock...
Empire Post-Exploitation Windows
Empire is a post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent. It is the merge of the previous PowerShell Empire and Python EmPyre projects. The framework offers cryptologically-secure...
Windows Exploit MS15-051 – CVE-2015-1701 – Privilege Escalation
This vulnerability exploit windows kernel vulnerability that leads to privilege escalation. Vulnerable: Microsoft Windows Vista Service Pack 2 0 Microsoft Windows Server 2008 for x64-based Systems SP2 Microsoft Windows Server 2008 for Itanium-based Systems SP2...