Windows Exploits
Last updated
Was this helpful?
Last updated
Was this helpful?
Search DIRECTORY for files that contain STRING
Configure a Windows machine as a WPA2-PSK Access Point
Configure a TCP port forwarding relay from IPv4 to IPv6
Mount Remote Network Share
Add New User to Current Host
Add User to Local Admin Group
Enumerate presence of files with SID access of User on ACLs of c:
Python Web Client: download file/webpage to file
Python Web Server: serve up current directory on port 8000
pwdump
cachedump
lsadump
metasploit's psexec_psh
load kiwi
https://github.com/gentilkiwi/mimikatz