Metasploit

# DNS (Port 53)
- auxiliary/gather/enum_dns  # Enumerate DNS information
- auxiliary/scanner/dns/dns_amp  # DNS amplification attack
- auxiliary/scanner/dns/dns_cache_scraper  # Scrape DNS cache

# Kerberos (Port 88)
- auxiliary/gather/kerberos_enumusers  # Enumerate users via Kerberos
- auxiliary/gather/kerberos_enum_tgs  # Enumerate Kerberos TGS tickets
- auxiliary/scanner/kerberos/kerberos_as_req  # Kerberos AS-REQ scanner (AS-REP Roasting)
- auxiliary/scanner/kerberos/kerberos_ticket_granting_service  # Enumerate SPNs for Kerberoasting

# MS-RPC (Port 135)
- exploit/windows/dcerpc/ms03_026_dcom  # Exploit MS-RPC DCOM vulnerability
- exploit/windows/dcerpc/ms17_010_eternalblue  # Exploit MS17-010 EternalBlue

# NetBIOS (Port 137-139)
- auxiliary/scanner/netbios/nbname  # NetBIOS name service scanner
- auxiliary/scanner/smb/smb_version  # SMB version scanner
- auxiliary/scanner/smb/smb_login  # Brute-force SMB login
- exploit/windows/smb/smb_relay  # SMB relay attack

# LDAP (Port 389)
- auxiliary/gather/ldap_enum  # LDAP enumeration
- auxiliary/gather/ldap_hashdump  # Dump hashes from LDAP
- auxiliary/admin/ldap/ldap_add_user  # Add user to LDAP server
- exploit/windows/ldap/ldap_pass_the_hash  # Pass-the-Hash for LDAP

# SMB (Port 445)
- auxiliary/scanner/smb/smb_enumshares  # Enumerate SMB shares
- auxiliary/scanner/smb/smb_enumusers  # Enumerate SMB users
- auxiliary/scanner/smb/smb_login  # SMB login brute-force
- exploit/windows/smb/ms17_010_psexec  # Exploit EternalBlue (psexec shell)
- exploit/windows/smb/ms08_067_netapi  # Exploit SMB MS08-067 vulnerability
- auxiliary/scanner/smb/smb_ms17_010  # Scan for MS17-010 vulnerability

# LDAPS (Port 636)
- auxiliary/scanner/ldap/ldap_search  # LDAP search over SSL
- auxiliary/gather/ldap_query  # Perform LDAP queries

# Global Catalog (Port 3268-3269)
- auxiliary/scanner/ldap/ldap_rootdse  # LDAP RootDSE information gathering

# RDP (Port 3389)
- auxiliary/scanner/rdp/rdp_scanner  # Basic RDP scanner
- auxiliary/scanner/rdp/rdp_enumcredssp  # Enumerate RDP CredSSP
- auxiliary/scanner/rdp/cve_2019_0708_bluekeep  # Scan for BlueKeep vulnerability (CVE-2019-0708)
- auxiliary/scanner/rdp/rdp_login  # Brute-force RDP logins
- exploit/windows/rdp/cve_2019_0708_bluekeep_rce  # Exploit BlueKeep (CVE-2019-0708)

# Windows Privilege Escalation
- exploit/windows/local/bypassuac  # Bypass UAC on Windows systems
- exploit/windows/local/ask  # Escalate privileges via the AlwaysInstallElevated policy
- exploit/windows/local/ms10_092_schelevator  # Exploit Task Scheduler Vulnerability (MS10-092)
- exploit/windows/local/ms16_032_secondary_logon_handle_privesc  # Escalate via Secondary Logon Handle (MS16-032)
- exploit/windows/local/ms14_058_track_popup_menu  # Kernel mode vulnerability exploit (MS14-058)
- exploit/windows/local/cve_2020_0787_bits  # Windows BITS Elevation of Privilege (CVE-2020-0787)
- exploit/windows/local/cve_2021_1675_printnightmare  # Windows Print Spooler Exploit (PrintNightmare CVE-2021-1675)
- exploit/windows/local/ms15_051_client_copy_image  # Exploit Client Copy Image Vulnerability (MS15-051)

# Generic Privilege Escalation Techniques
- post/multi/recon/local_exploit_suggester  # Suggest potential local exploits for privilege escalation
- exploit/multi/local/ntfs_priv_esc  # Escalate privileges by abusing NTFS vulnerability
- exploit/windows/local/cve_2021_1732_win32k  # Exploit Windows Win32k Privilege Escalation (CVE-2021-1732)

Atualizado