From c8e033b61b038c303d1eb6f90b5d5236a5c1b110 Mon Sep 17 00:00:00 2001 From: whx Date: Sun, 13 Nov 2022 01:27:45 +0100 Subject: [PATCH] added windows exploit suggesters to references --- Post Exploitation/References.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/Post Exploitation/References.md b/Post Exploitation/References.md index 39ef213..dacc6d0 100644 --- a/Post Exploitation/References.md +++ b/Post Exploitation/References.md @@ -7,6 +7,9 @@ [Seatbelt](https://github.com/GhostPack/Seatbelt.git) [hemp3l's sucrack](https://github.com/hemp3l/sucrack.git) [linuxprivchecker](https://github.com/sleventyeleven/linuxprivchecker.git) +[Windows-Exploit-Suggester](https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git) +[Windows-Exploit-Suggester Python3](https://github.com/Pwnistry/Windows-Exploit-Suggester-python3.git) +[Windows-Exploit-Suggester Next Generation](https://github.com/bitsadmin/wesng.git) ## Firefox Decryption @@ -21,6 +24,7 @@ [Gentilkiwi's Mimikatz](https://github.com/gentilkiwi/mimikatz.git) + ## Command and Control Frameworks There is a [C2 Tools overview](https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0) which collected nearly every C2 out there. Here is a selection of some of them. @@ -52,4 +56,3 @@ There is a [C2 Tools overview](https://docs.google.com/spreadsheets/d/1b4mUxa6cD * Dark Vortex [Bruteratel](https://bruteratel.com/) -