0x4xel / Bat-PotatoLinks
Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.
☆45Updated 2 years ago
Alternatives and similar repositories for Bat-Potato
Users that are interested in Bat-Potato are comparing it to the libraries listed below
Sorting:
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- Windows Privilege Escalation☆63Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆39Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆90Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- Azure Service Subdomain Enumeration☆60Updated 8 months ago
- ☆38Updated this week
- ☆34Updated 3 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last year
- Exploits targeting vBulletin.☆76Updated 2 years ago
- List of some AD tools I frequently use☆45Updated 3 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- CVE-2023-20198 Exploit PoC☆48Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆47Updated 3 years ago
- .Net Assembly loader for the GMSAPasswordReader☆12Updated 2 years ago
- ☆22Updated 3 years ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- ☆50Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year