ENNAENNA

PowerSploit vs PrivescCheck

GitHub Stats

13.0k
Stars
3.8k
4.7k
Forks
500
103
Issues
4
5y ago
Updated
11d ago
-
License
BSD-3-Clause
PowerShell
Language
PowerShell

About PowerSploit

PowerSploit is a collection of Microsoft PowerShell modules that aid penetration testers during all phases of an assessment. Modules include PowerView (AD enumeration), Invoke-Mimikatz (in-memory credential extraction), Get-GPPPassword (Group Policy preference passwords), and dozens more. While the project is archived, it remains one of the most referenced PowerShell offensive toolkits and its techniques are still actively used.

About PrivescCheck

PrivescCheck is a PowerShell script that enumerates common Windows privilege escalation vectors. It checks for misconfigured services (unquoted paths, weak permissions, writable binaries), vulnerable scheduled tasks, exploitable registry keys, stored credentials (Windows Vault, GPP passwords, autologon), DLL hijacking opportunities, AlwaysInstallElevated policies, and dozens of other escalation paths. Unlike automated exploitation tools, PrivescCheck only enumerates and reports findings, allowing the tester to understand and manually exploit each vector. Output is color-coded by severity with detailed remediation guidance.

Platform Support

🪟windows
🪟windows

Tags

Shared

powershell

PowerSploit only

post-exploitationactive-directorycredential-theftarchived

PrivescCheck only

privilege-escalationwindowsenumerationsecurity-audit