k4sth4 / Juicy-Potato
Windows Privilege Escalation
☆54Updated 2 years ago
Alternatives and similar repositories for Juicy-Potato:
Users that are interested in Juicy-Potato are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆108Updated 3 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆106Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆35Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆107Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- ☆73Updated 6 months ago
- A collection of Cobalt Strike Aggressor scripts.☆91Updated 3 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆68Updated 6 months ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆1Updated 8 months ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- ☆99Updated last year
- C# havoc implant☆98Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆69Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆166Updated 3 months ago
- Malicious powershell scripts loader designed to avoid detection.☆46Updated last year
- ☆47Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆81Updated last year
- ACL abuse swiss-knife☆119Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆33Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆90Updated 3 years ago