k4sth4 / Juicy-Potato
Windows Privilege Escalation
☆54Updated 2 years ago
Alternatives and similar repositories for Juicy-Potato:
Users that are interested in Juicy-Potato are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆105Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 2 years ago
- ☆95Updated last year
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆1Updated 7 months ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- ☆54Updated 2 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- SeManageVolumePrivilege to SYSTEM☆79Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆166Updated 2 months ago
- ☆34Updated last month
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆106Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆37Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆105Updated 11 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 2 years ago
- ☆85Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆125Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆81Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆90Updated 3 years ago