hackvens / CoercedPotatoLinks
☆232Updated last year
Alternatives and similar repositories for CoercedPotato
Users that are interested in CoercedPotato are comparing it to the libraries listed below
Sorting:
- A Tool that aims to evade av with binary padding☆156Updated last year
- A Windows potato to privesc☆386Updated last year
- Fileless atexec, no more need for port 445☆397Updated last year
- Heavily obfuscated ASP web shell generation tool.☆172Updated last year
- C2 redirector base on caddy☆209Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆248Updated last year
- ☆219Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆399Updated 2 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆398Updated 2 years ago
- AdaptixFramework Extension Kit☆292Updated last week
- ☆165Updated 2 years ago
- ☆338Updated 9 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆334Updated 2 years ago
- ☆157Updated last year
- RCE exploit for CVE-2023-3519☆230Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆348Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- PoC Exploit for the NTLM reflection SMB flaw.☆588Updated 5 months ago
- ☆233Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated 2 years ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆202Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆196Updated last year
- ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!☆105Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆312Updated 3 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆328Updated 3 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆489Updated 5 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Updated last year
- exploit for f5-big-ip RCE cve-2023-46747☆206Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆175Updated last week