Enumerator : Post exploitation information extractor for privilege escalation.

Enumerator : Post exploitation information extractor for privilege escalation.

Enumerator : Post exploitation information extractor for privilege escalation (windows and linux environment)
List of Tools :
– my_linux_enum_v.2.sh
– my_win_enum_v1.0.bat
Example Outputrun-enumerator

1. Finding os details
2. Finding hostname
3. Finding exploited user name
4. All users on the system
5. Getting group membership, active sessions, account lock out policy
5.1. Display which group policies are applied and info about the OS if victim is the member of a domain:
6. Checking available network interfaces and routing table
7. routing table
8. Checking ARP cache table for all available interfaces
9. Checking active network connections
9.1. Checking hidden, non-hidden share
9.2. list all the hosts on the “compromised host’s domain” and list the domains that the compromised host can see
9.3. enumerate all users on the domain
10. The netsh firewall state
11. Firewall configuration
12. Scheduled tasks
13. Running processes
13.1. System variable and paths
14. Started windows services
15. Installed 3rd party drivers

– my_win_juuicy_info_extractor_v1.0.bat
Html Output
– my_wmic_cmd_v1.0.bat
Example Output:

Download : Master.zip
Source : https://github.com/greyshell