k4sth4 / Juicy-Potato
Windows Privilege Escalation
☆57Updated 2 years ago
Alternatives and similar repositories for Juicy-Potato:
Users that are interested in Juicy-Potato are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆55Updated 5 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆109Updated 2 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆109Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆73Updated 7 months ago
- SeRestorePrivilege to SYSTEM☆105Updated 3 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆110Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆70Updated 7 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆170Updated 2 years ago
- ☆48Updated 2 years ago
- ☆38Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- ☆79Updated 8 months ago
- ☆86Updated last year
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆1Updated 10 months ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆24Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 2 months ago
- A collection of Cobalt Strike Aggressor scripts.☆94Updated 3 years ago