k4sth4 / Juicy-Potato
Windows Privilege Escalation
☆56Updated 2 years ago
Alternatives and similar repositories for Juicy-Potato:
Users that are interested in Juicy-Potato are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- C# havoc implant☆100Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆102Updated last year
- ☆38Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆108Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆110Updated 3 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- AV EVASION TECHNIQUES☆77Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆95Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆92Updated last year
- ☆54Updated 4 months ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆36Updated 2 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- ☆48Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆21Updated last month
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆87Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆69Updated 7 months ago