Windows Event Log Killer
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
FUD win32 msfvenom payload generator
Windows Hardening settings and configurations
Privilege Escalation Enumeration Script for Windows
Automation for internal Windows Penetrationtest / AD-Security
These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.
A tool to spray love around the world.
WES-NG is a tool based on the output of Windows' systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to, including any exploits for these vulnerabilities. Every Windows OS between Windows XP and Windows 10, including their Windows Server counterparts, is supported.
Mimikatz implementation in pure Python
EasySploit - Metasploit automation (EASIER and FASTER than EVER)
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.