PowerUp Logo

PowerUp

0
Free
Updated 11 March 2025
Visit Website

To install this module, drop the entire Privesc folder into one of your module directories. The default PowerShell module paths are listed in the $Env:PSModulePath environment variable. The default per-user module path is: "$Env:HomeDrive$Env:HOMEPATH\Documents\WindowsPowerShell\Modules" The default computer-level module path is: "$Env:windir\System32\WindowsPowerShell\v1.0\Modules" To use the module, type Import-Module Privesc To see the commands imported, type Get-Command -Module Privesc For help on each individual command, Get-Help is your friend. Note: The tools contained within this module were all designed such that they can be run individually. Including them in a module simply lends itself to increased portability. PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations. Running Invoke-AllChecks will output any identifiable vulnerabilities along with specifications for any abuse functions. The -HTMLReport flag will also generate a COMPUTER.username.html version of the report. Author: @harmj0y License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None Token/Privilege Enumeration/Abuse: Get-Pr

FEATURES

SIMILAR TOOLS

A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

Free

A tool for searching through public EBS snapshots for secrets, organized as an Elastic Beanstalk application.

Free

Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.

Free

Identify AWS IAM permissions by brute-forcing API calls.

Free

A platform that discovers, manages and secures non-human identities like service accounts, API keys and secrets across enterprise environments.

Commercial

Guidelines and best practices for securely storing passwords.

Free

This article discusses protected accounts and groups in Active Directory, providing examples and screenshots to illustrate key concepts.

Free

Find leaked credentials by scanning repositories for high entropy strings.

Free

Safely store secrets in version control repositories with GPG encryption support.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved