hackvens / CoercedPotato
☆227Updated 5 months ago
Alternatives and similar repositories for CoercedPotato:
Users that are interested in CoercedPotato are comparing it to the libraries listed below
- Fileless atexec, no more need for port 445☆366Updated last year
- A Tool that aims to evade av with binary padding☆148Updated 9 months ago
- ☆163Updated last year
- Heavily obfuscated ASP web shell generation tool.☆160Updated 11 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆238Updated 10 months ago
- Escalate Service Account To LocalSystem via Kerberos☆394Updated last year
- A Windows potato to privesc☆365Updated 7 months ago
- C2 redirector base on caddy☆203Updated 10 months ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆371Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆417Updated last year
- Credential Guard Bypass Via Patching Wdigest Memory☆323Updated 2 years ago
- ☆215Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆115Updated last year
- Terminate AV/EDR Processes using kernel driver☆341Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 8 months ago
- ☆327Updated 2 months ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆317Updated 2 years ago
- ☆224Updated 11 months ago
- RCE exploit for CVE-2023-3519☆223Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆156Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆297Updated 2 years ago
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆92Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆206Updated this week
- ☆154Updated 9 months ago
- Go shellcode loader that combines multiple evasion techniques☆364Updated last year
- Reverse shell that can bypass windows defender detection☆164Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆451Updated last year
- Evasive Golang Loader☆131Updated 8 months ago
- Awesome AV/EDR/XDR Bypass Tips☆267Updated 2 years ago
- MSSQL Database Attacker tool☆189Updated 2 years ago