In this article, we will shed light on some of the automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses to Windows OS based Devices. Table of Content Introduction Privilege Escalation Vectors Getting Access on Windows Machine WinPEAS Seatbelt SharpUp JAWS – Just
The post Window Privilege Escalation: Automated Script appeared first on Hacking Articles.