JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.
Credit:
mayfly (@M4yFly)
The below privilege escalations are inspired from: https://github.com/cfalta/MicrosoftWontFixList
- InstallerFileTakeOver: https://github.com/klinix5/InstallerFileTakeOver
- SeriousSAM / HiveNightmare: https://github.com/GossiTheDog/HiveNightmare
- Potato: https://github.com/d4rckh/WindowsPotatoes
- PetitPotam: https://github.com/topotam/PetitPotam
- samAccountName Spoofing: https://github.com/cube0x0/noPac / https://github.com/WazeHell/sam-the-admin
- PrintNightmare: https://github.com/cube0x0/CVE-2021-1675
- ZeroLogon: https://github.com/dirkjanm/CVE-2020-1472 / https://github.com/risksense/zerologon / https://github.com/SecuraBV/CVE-2020-1472
- ADCS (Certified Pre-Owned): https://posts.specterops.io/certified-pre-owned-d95910965cd2
- NoPac: https://github.com/cube0x0/noPac
KrbRelay: https://github.com/cube0x0/KrbRelay