Skip to content
/ LOC Public

Lion of control - Advanced Windows enumeration tool written in C. Helps discover privilege‑escalation vectors used in real APT tradecraft: unquoted paths, weak services, writable directories, token privileges, and misconfigurations. Ideal for red teaming, pentesting, and malware analysis.

Notifications You must be signed in to change notification settings

Saad-Ayady/LOC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Windows Privilege Escalation Scanner

Advanced Red Team & Pentest Enumeration Tool (C)

  • A lightweight, fast, and fully‑native Windows privilege‑escalation scanner written in C, designed to mimic real APT‑style tradecraft (like APT28, FIN7, etc.).
  • The tool performs deep enumeration to uncover misconfigurations, weak permissions, token privileges, and exploitable system settings used during real‑world intrusions.

🚀 Features :

🔍 Privilege Enumeration :

  • Detects SeImpersonatePrivilege, SeDebugPrivilege, and other high‑value token privileges.
  • Returns clean results (1/0) for automation in chained exploits.

📂 File & Directory Misconfigurations

  • Finds Unquoted Service Paths and checks if they are actually exploitable (write access).
  • Scans for writable directories in system‑level paths.

🛠️ Service Misconfigurations :

  • Enumerates all Windows services
  • Detects weak ACLs & permission abuse
  • Checks binary paths, start type, and attack surface

🪟 System & Network Enumeration:

  • OS version, build, and architecture
  • Logged‑in users
  • Network interfaces & ARP table
  • Domain/workgroup details

👣 Red Team Oriented :

  • Behaves similarly to tools used by APT groups and advanced operators
  • No dependencies—static and stealthy
  • Fast, minimal, ideal for initial foothold enumeration

📦 Build Instructions

🔧 Linux (MinGW)

bash install.sh

make

🔧 Windows (MinGW / Visual Studio)

make

📄 Output Example:

=== Unquoted Service Path Analysis ===
======== Unquoted Service Path =========
[INFO] rsDNSClientSvc
              service name : rsDNSClientSvc
              writable path : Yes
              service path : C:\Program Files\ReasonLabs\DNS\rsDNSClientSvc.exe

======== Privilege Escalation CVE Scan =========

[VULNERABLE] System is affected by CVE-2024-21338
Exploit : https://www.exploit-db.com/exploits/52275
------------------------------------------

⚠️ Disclaimer :

  • This tool is for educational, red teaming, and authorized penetration testing only.
  • The author is not responsible for any misuse.

Roadmap 🧩:

  • UAC bypass detection
  • Registry misconfiguration scanning
  • DLL hijacking & search‑order weaknesses

❤️ Contribute :

Pull requests welcome—optimizations, new modules, exploit detection logic, or documentation improvements.

About

Lion of control - Advanced Windows enumeration tool written in C. Helps discover privilege‑escalation vectors used in real APT tradecraft: unquoted paths, weak services, writable directories, token privileges, and misconfigurations. Ideal for red teaming, pentesting, and malware analysis.

Resources

Stars

Watchers

Forks

Packages

No packages published