Advanced Enumeration for Privilege Escalation in Windows
Invoke-Enum.ps1 is an advanced tool written in PowerShell that allows cybersecurity analysts to identify potential privilege escalation vectors on Windows systems. The script provides structured, secure, and fully Spanish-language output, with a professional approach for auditing, red teaming, or defensive analysis environments.
- Detection of installed security patches
- Enumeration of sensitive privileges of the current user with
whoami /priv - Detection of privileged tokens (
SeImpersonate,SeAssignPrimaryToken,SeBackupPrivilege,SeRestorePrivilege,SeTakeOwnershipPrivilege,SeDebugPrivilege,SeLoadDriverPrivilege,SeTcbPrivilege,SeManageVolumePrivilege,SeCreateTokenPrivilege) - Credential extraction:
- AutoLogon keys (
DefaultUserName,DefaultPassword) - Credentials saved in
cmdkey Groups.xmlfiles withcpasswordunattend.xml,sysprep.xmlfilesautounattend.xml- Unquoted Service Paths (Unquoted Service Paths)
- Detection of dangerous configurations such as
AlwaysInstallElevated - Analysis of
PATHpaths withWrite,Modify, orFullControlpermissions - Review of automatic execution keys (
Runfrom HKCU and HKLM) - Detection of scheduled tasks outside of Microsoft and their associated executables
- Association of open ports with services and processes
- Deep disk scan:
.exeexecutables withFullControlforUsersorEveryone.ps1,.bat,.dll,.vbsfiles with write permissions- Detection of services and their binary versions to search for CVEs
- Enumeration of installed third-party applications
- Collection of sensitive files:
.pfx,.pem,.sql,.config,.bak,.rdp,.key,.ini,.kdbx,.ovpn, etc.- Verification and location of
SAMandSYSTEMhives on disk - Analysis of system information (OS, hardware, users, groups)
- Evaluation of UAC (User Account Control) settings
- Search for DPAPI credentials in registry and files
- Scanning of extended network information (IP configuration, routing table)
- Detection of PowerShell history and sensitive commands
powershell.exe -ep bypass -File .\Invoke-Enum.ps1Or run in memory:
iex (Get-Content .\Invoke-Enum.ps1 -Raw)- PowerShell 5.0 or higher
- Standard user permissions (no administrative privileges required)
- Compatible with: Windows 7, 10, 11, Server 2012/2016/2019





