TsukiCTF / Lovely-PotatoView external linksLinks
Automating juicy potato local privilege escalation exploit for penetration testers
☆147Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for Lovely-Potato
Users that are interested in Lovely-Potato are comparing it to the libraries listed below
Sorting:
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,148Jan 9, 2021Updated 5 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- Evading WinDefender ATP credential-theft☆256Dec 2, 2019Updated 6 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- ☆360Apr 24, 2021Updated 4 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- Retrieve LAPS password from LDAP☆433Feb 17, 2021Updated 4 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,729Dec 18, 2021Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275May 3, 2023Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Lockless allows for the copying of locked files.☆252Apr 30, 2021Updated 4 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- MS-FSRVP coercion abuse PoC☆305Dec 30, 2021Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆672May 3, 2020Updated 5 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- C# .NET Assembly for interacting with File Object DACLs☆46Apr 3, 2020Updated 5 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,173Sep 10, 2020Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Run Rubeus via Rundll32☆208Apr 25, 2020Updated 5 years ago