Windows
Introduction
Tools
Seatbelt.exe -group=system
# runs the following commands:
# AMSIProviders, AntiVirus, AppLocker, ARPTable, AuditPolicies,
# AuditPolicyRegistry, AutoRuns, Certificates, CertificateThumbprints,
# CredGuard, DNSCache, DotNet, EnvironmentPath,
# EnvironmentVariables, Hotfixes, InterestingProcesses, InternetSettings,
# LAPS, LastShutdown, LocalGPOs, LocalGroups,
# LocalUsers, LogonSessions, LSASettings, McAfeeConfigs,
# NamedPipes, NetworkProfiles, NetworkShares, NTLMSettings,
# OptionalFeatures, OSInfo, PoweredOnEvents, PowerShell,
# Processes, PSSessionSettings, RDPSessions, RDPsettings,
# SCCM, Services, Sysmon, TcpConnections,
# TokenPrivileges, UAC, UdpConnections, UserRightAssignments,
# WifiProfile, WindowsAutoLogon, WindowsDefender, WindowsEventForwarding,
# WindowsFirewall, WMI, WMIEventConsumer, WMIEventFilter,
# WMIFilterBinding, WSUSSeImpersonatePrivilege
Hot Potato
Hot Potato (PowerShell)
Juicy Potato
Rogue Potato
PrintSpoofer
Windows Services
General commands
Weak Windows Service Permissions


Weak Service Binary Permissions
Unquoted Service Path


DLL Hijacking

Search for credentials
RunAs
Always Install Elevated

Delegation Tokens
Token Kidnapping
CVE-2019-1388 (hhupd)
Kernel Exploits
Exploit listing
Suggested tools
Windows Exploit Suggester
Watson
Sherlock
References
Last updated