{"id":12460,"date":"2021-04-12T20:34:53","date_gmt":"2021-04-12T15:04:53","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=12460"},"modified":"2021-04-12T20:34:53","modified_gmt":"2021-04-12T15:04:53","slug":"watson","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/watson\/","title":{"rendered":"Watson : Enumerate Missing KBs &#038; Suggest Exploits For Useful Privilege Escalation Vulnerabilities"},"content":{"rendered":"\n<p><strong>Watson <\/strong>is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Supported Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004<\/li><li>Server 2016 &amp; 2019<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">&#8211; <strong>OS Build Number: 14393<\/strong><br>&gt;&gt;Enumerating installed KBs\u2026<br><br>&#8211; <strong>CVE-2019-0836 : VULNERABLE<\/strong><br>&gt;&gt;https:\/\/exploit-db.com\/exploits\/46718<br>&gt;&gt;https:\/\/decoder.cloud\/2019\/04\/29\/combinig-luafv-postluafvpostreadwrite-race-condition-pe-with-diaghub-collector-exploit-from-standard-user-to-system\/<br><br>&#8211; <strong>CVE-2019-0841 : VULNERABLE<\/strong><br>&gt;&gt;https:\/\/github.com\/rogue-kdc\/CVE-2019-0841<br>&gt;&gt;https:\/\/rastamouse.me\/tags\/cve-2019-0841\/<br><br>&#8211; <strong>CVE-2019-1064 : VULNERABLE<\/strong><br>&gt;&gt;https:\/\/www.rythmstick.net\/posts\/cve-2019-1064\/<br><br>&#8211; <strong>CVE-2019-1130 : VULNERABLE<\/strong><br>&gt;&gt;https:\/\/github.com\/S3cur3Th1sSh1t\/SharpByeBear<br><br>&#8211; <strong>CVE-2019-1253 : VULNERABLE<\/strong><br>&gt;&gt;https:\/\/github.com\/padovah4ck\/CVE-2019-1253<br><br>&#8211; <strong>CVE-2019-1315 : VULNERABLE<\/strong><br>&gt;&gt;https:\/\/offsec.almond.consulting\/windows-error-reporting-arbitrary-file-move-eop.html<br>Finished. Found 6 potential vulnerabilities.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Issues<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>I try to update Watson after every Patch Tuesday, but for potential false positives check the latest supersedence information in the <a href=\"https:\/\/www.catalog.update.microsoft.com\/Home.aspx\">Windows Update Catalog<\/a>. If you still think there&#8217;s an error, raise an Issue with the <code>Bug<\/code> label.<\/li><li>If there&#8217;s a particular vulnerability that you want to see in Watson that&#8217;s not already included, raise an Issue with the <code>Vulnerability Request<\/code> label and include the CVE number.<\/li><li>If you know of a good exploit for any of the vulnerabilities in Watson, raise an Issue with the <code>Exploit Suggestion<\/code> label and provide a URL to the exploit.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/rasta-mouse\/Watson\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities. Supported Versions Windows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004 Server 2016 &amp; 2019 Usage &#8211; OS Build Number: 14393&gt;&gt;Enumerating installed KBs\u2026 &#8211; CVE-2019-0836 : VULNERABLE&gt;&gt;https:\/\/exploit-db.com\/exploits\/46718&gt;&gt;https:\/\/decoder.cloud\/2019\/04\/29\/combinig-luafv-postluafvpostreadwrite-race-condition-pe-with-diaghub-collector-exploit-from-standard-user-to-system\/ &#8211; CVE-2019-0841 : VULNERABLE&gt;&gt;https:\/\/github.com\/rogue-kdc\/CVE-2019-0841&gt;&gt;https:\/\/rastamouse.me\/tags\/cve-2019-0841\/ &#8211; CVE-2019-1064 : VULNERABLE&gt;&gt;https:\/\/www.rythmstick.net\/posts\/cve-2019-1064\/ [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16746,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png","fifu_image_alt":"Watson : Enumerate Missing KBs & Suggest Exploits For Useful Privilege Escalation Vulnerabilities","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[3560,3601],"class_list":["post-12460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-vulnerabilities","tag-watson"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Watson : Exploits For Useful Privilege Escalation Vulnerabilities<\/title>\n<meta name=\"description\" content=\"Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/watson\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watson : Exploits For Useful Privilege Escalation Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/watson\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-12T15:04:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Watson : Enumerate Missing KBs &#038; Suggest Exploits For Useful Privilege Escalation Vulnerabilities\",\"datePublished\":\"2021-04-12T15:04:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/\"},\"wordCount\":231,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png\",\"keywords\":[\"Vulnerabilities\",\"Watson\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/watson\/\",\"name\":\"Watson : Exploits For Useful Privilege Escalation Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png\",\"datePublished\":\"2021-04-12T15:04:53+00:00\",\"description\":\"Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/watson\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Watson : Exploits For Useful Privilege Escalation Vulnerabilities","description":"Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/watson\/","og_locale":"en_US","og_type":"article","og_title":"Watson : Exploits For Useful Privilege Escalation Vulnerabilities","og_description":"Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.","og_url":"https:\/\/kalilinuxtutorials.com\/watson\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-04-12T15:04:53+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/watson\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/watson\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Watson : Enumerate Missing KBs &#038; Suggest Exploits For Useful Privilege Escalation Vulnerabilities","datePublished":"2021-04-12T15:04:53+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/watson\/"},"wordCount":231,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png","keywords":["Vulnerabilities","Watson"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/watson\/","url":"https:\/\/kalilinuxtutorials.com\/watson\/","name":"Watson : Exploits For Useful Privilege Escalation Vulnerabilities","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png","datePublished":"2021-04-12T15:04:53+00:00","description":"Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/watson\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/watson\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-nFBfS9OkCBE\/YG97Dfy3oPI\/AAAAAAAAIsU\/uE_MyOydfI4ZYRoPc_HBuKwIetuvXCR0ACLcBGAsYHQ\/s728\/Privilege%2BEscalation%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":12358,"url":"https:\/\/kalilinuxtutorials.com\/offensivepipeline\/","url_meta":{"origin":12460,"position":0},"title":"OffensivePipeline : Tool To Download, Compile &#038; Obfuscate C# Tools For Red Team Exercises","author":"R K","date":"March 23, 2021","format":false,"excerpt":"OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises. It downloads the tool from the git repository, then compiles it with msbuild and finally obfuscates it with ConfuserEx. Examples List all tools: OffensivePipeline.exe list Build all tools: OffensivePipeline.exe all Build a tool OffensivePipeline.exe\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6395,"url":"https:\/\/kalilinuxtutorials.com\/0xsp-mongoose-privilege-escalation-enumeration\/","url_meta":{"origin":12460,"position":1},"title":"0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64\/32 )","author":"R K","date":"September 4, 2019","format":false,"excerpt":"Using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting information stage until reporting information through 0xsp Web Application API . User will be able to scan different Linux \/ windows Operation systems at same time with high\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/lG3HS7a9sVc\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":37081,"url":"https:\/\/kalilinuxtutorials.com\/oscp\/","url_meta":{"origin":12460,"position":2},"title":"OSCP : Navigating The Essential Toolkit For Penetration Testing","author":"Varshini","date":"March 14, 2025","format":false,"excerpt":"The OSCP (Offensive Security Certified Professional) certification is a highly respected credential in the cybersecurity industry, focusing on hands-on penetration testing skills. To achieve this certification, candidates must demonstrate proficiency in using various tools and techniques to identify vulnerabilities and exploit them. Here's an overview of some key tools and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11153,"url":"https:\/\/kalilinuxtutorials.com\/dazzleup\/","url_meta":{"origin":12460,"position":3},"title":"DazzleUP : A Tool That Detects The Privilege Escalation Vulnerabilities","author":"R K","date":"August 9, 2020","format":false,"excerpt":"DazzleUP is a tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. dazzleUP detects the following vulnerabilities. Exploit Checks The first feature of dazzleUP is that it uses Windows Update Agent API instead of WMI (like others) when finding missing patches.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12302,"url":"https:\/\/kalilinuxtutorials.com\/powersharppack\/","url_meta":{"origin":12460,"position":4},"title":"PowerSharpPack : Offensive CSharp Projects Wraped Into Powershell","author":"R K","date":"March 17, 2021","format":false,"excerpt":"PowerSharpPack is a tool with many useful offensive CSharp Projects warped into Powershell for easy usage. Why? In my personal opinion offensive Powershell is not dead because of AMSI, Script-block-logging, Constrained Language Mode or other protection features. Any of these mechanisms can be bypassed. Since most new innovative offensive security\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4910,"url":"https:\/\/kalilinuxtutorials.com\/vulmap-vulnerability-scanners\/","url_meta":{"origin":12460,"position":5},"title":"Vulmap :Online Local Vulnerability Scanners Project","author":"R K","date":"May 9, 2019","format":false,"excerpt":"Vulmap is an open source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also they can be used for\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=12460"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16746"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=12460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=12460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=12460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}