k4sth4 / Juicy-Potato
Windows Privilege Escalation
☆61Updated 2 years ago
Alternatives and similar repositories for Juicy-Potato:
Users that are interested in Juicy-Potato are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆109Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆37Updated 2 years ago
- ☆56Updated 5 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆72Updated 7 months ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- List of some AD tools I frequently use☆45Updated 3 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆174Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- ☆39Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated 2 years ago
- ☆79Updated 9 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆137Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆95Updated 3 years ago
- SeRestorePrivilege to SYSTEM☆108Updated 3 years ago
- DCSync Attack from Outside using Impacket☆112Updated 3 years ago
- ☆38Updated 2 weeks ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- ☆86Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆111Updated 3 years ago