PowerSploit vs PrivescCheck
GitHub Stats
About PowerSploit
PowerSploit is a collection of Microsoft PowerShell modules that aid penetration testers during all phases of an assessment. Modules include PowerView (AD enumeration), Invoke-Mimikatz (in-memory credential extraction), Get-GPPPassword (Group Policy preference passwords), and dozens more. While the project is archived, it remains one of the most referenced PowerShell offensive toolkits and its techniques are still actively used.
About PrivescCheck
PrivescCheck is a PowerShell script that enumerates common Windows privilege escalation vectors. It checks for misconfigured services (unquoted paths, weak permissions, writable binaries), vulnerable scheduled tasks, exploitable registry keys, stored credentials (Windows Vault, GPP passwords, autologon), DLL hijacking opportunities, AlwaysInstallElevated policies, and dozens of other escalation paths. Unlike automated exploitation tools, PrivescCheck only enumerates and reports findings, allowing the tester to understand and manually exploit each vector. Output is color-coded by severity with detailed remediation guidance.
Platform Support
Tags
Shared
PowerSploit only
PrivescCheck only