# Windows

- [TeamViewer Decrypt](/notes/windows-1/teamviewer-decrypt.md)
- [Commando VM](/notes/windows-1/commando-vm.md)
- [PrivEsc](/notes/windows-1/privesc.md): Everything related to Windows Privilege Escalation
- [Bypass AppLocker](/notes/windows-1/privesc/bypass-applocker.md)
- [Disable Windows Defender](/notes/windows-1/privesc/disable-windows-defender.md)
- [Abusing Services](/notes/windows-1/privesc/abusing-services.md)
- [Blogs About Windows](/notes/windows-1/privesc/blogs-about-windows.md)
- [Guides](/notes/windows-1/privesc/guides.md): Windows Privilege Escalation Guides from different resources
- [Powershell Runas](/notes/windows-1/privesc/powershell-runas.md)
- [Living Off The Land Binaries and Scripts](/notes/windows-1/privesc/living-off-the-land-binaries.md)
- [DLL Injection](/notes/windows-1/privesc/dll-injection.md)
- [Common Windows PrivEsc](/notes/windows-1/privesc/basic-windows-privesc.md)
- [Windows PrivEsc Exploits](/notes/windows-1/privesc/windows-privesc-exploits.md)
- [Abusing Files Permissions](/notes/windows-1/privesc/abusing-files-permissions.md)
- [Interesting Files](/notes/windows-1/privesc/interesting-files.md)
- [File Transfer Methods](/notes/windows-1/privesc/file-transfer-methods.md)
- [Bloodhound](/notes/windows-1/privesc/bloodhound.md)
- [Potatos and Tokens](/notes/windows-1/privesc/rotten-potato.md)
- [PrintSpoofer Win10 - Server 2016/2019](/notes/windows-1/privesc/rotten-potato/printspoofer-win10-server-2016-2019.md)
- [SessionGopher.ps1](/notes/windows-1/privesc/sessiongopher.ps1.md)
- [Sherlock.ps1](/notes/windows-1/privesc/sherlock.ps1.md)
- [Windows - PrivEsc Scripts](/notes/windows-1/privesc/windows-privesc-scripts.md)
- [Windows Exploit Suggester](/notes/windows-1/privesc/windows-privesc-scripts/windows-exploit-suggester.md)
- [Powershell](/notes/windows-1/powershell.md)
- [Anti-Virus Evasion](/notes/windows-1/anti-virus-evasion.md)
- [Post-Exploitation](/notes/windows-1/post-exploitation.md)
- [Extract Windows Hashes Offline](/notes/windows-1/post-exploitation/extract-windows-hashes-offline.md)
- [Dumping Domain Password Hashes](/notes/windows-1/post-exploitation/dump-hashes.md)
- [Vulnerabilities](/notes/windows-1/vulnerabilities.md)
- [MS15-051](/notes/windows-1/vulnerabilities/ms15-051.md)
- [MS17-010](/notes/windows-1/vulnerabilities/ms17-010.md)
- [MS08-067](/notes/windows-1/vulnerabilities/ms08-067.md)
- [Active Directory](/notes/windows-1/active-directory-enumeration.md)
- [Get-DomainSPN Ticket](/notes/windows-1/active-directory-enumeration/get-domainspn-ticket.md)
- [Kerberos](/notes/windows-1/active-directory-enumeration/kerberos.md)
- [Bloodhound](/notes/windows-1/active-directory-enumeration/bloodhound.md)
- [DNS Admin to SYSTEM](/notes/windows-1/active-directory-enumeration/dns-admin-to-system.md)
- [DC Sync Attack](/notes/windows-1/active-directory-enumeration/dc-sync.md)
- [Escalating privileges with ACLs in Active Directory](/notes/windows-1/active-directory-enumeration/escalating-privileges-with-acls-in-active-directory.md)
- [How SMB Relay Works](/notes/windows-1/active-directory-enumeration/how-smb-relay-works.md)
- [Practical Guide to NTLM Relaying](/notes/windows-1/active-directory-enumeration/practical-guide-to-ntlm-relaying.md)
- [Microsoft Exchange – ACL](/notes/windows-1/active-directory-enumeration/microsoft-exchange-acl.md)
