decoder-it / LocalPotatoLinks
☆705Updated 2 years ago
Alternatives and similar repositories for LocalPotato
Users that are interested in LocalPotato are comparing it to the libraries listed below
Sorting:
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆453Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆936Updated 3 years ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆585Updated last year
- Execute unmanaged Windows executables in CobaltStrike Beacons☆711Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆508Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆402Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆505Updated 8 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆535Updated 2 months ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆439Updated last year
- ☆1,116Updated last month
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆815Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆621Updated last year
- A C# Command & Control framework☆1,024Updated last year
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆565Updated 2 years ago
- ☆539Updated 4 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Updated last year
- ☆824Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆460Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆669Updated 5 months ago
- Windows remote execution multitool☆779Updated 4 months ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆389Updated 2 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆570Updated 2 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆724Updated 5 months ago
- Useful C2 techniques and cheat sheets learned from engagements☆576Updated 4 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆601Updated last year
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆338Updated 3 years ago
- PoC Exploit for the NTLM reflection SMB flaw.☆669Updated 2 weeks ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,192Updated 9 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆457Updated last year