Windows Privilege Escalation
☆74Jun 7, 2022Updated 3 years ago
Alternatives and similar repositories for Juicy-Potato
Users that are interested in Juicy-Potato are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆167Sep 13, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- SeManageVolumePrivilege to SYSTEM☆151Nov 22, 2023Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆72Oct 2, 2023Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,164Jan 9, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆61Jan 18, 2023Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- ☆187May 29, 2023Updated 2 years ago
- go实现的shellcode免杀加载器,实测时可过火绒,360。当前效果请自行评判。☆47Sep 11, 2024Updated last year
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Personally developed tools for buffer overflow attacks☆24Sep 25, 2022Updated 3 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Apr 19, 2025Updated 11 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Modifying SweetPotato to support load shellcode and webshell☆788Jun 2, 2021Updated 4 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- ☆300Mar 31, 2022Updated 3 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆136May 17, 2022Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Windows Local Privilege Escalation from Service Account to System☆925Feb 23, 2020Updated 6 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆21Jul 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SettingContent-MS File Execution vulnerability in Windows 10☆24Jan 7, 2026Updated 2 months ago
- ☆35May 31, 2023Updated 2 years ago
- Big Data tool for metadata extraction (Exif), enrichment (using DeepLearning) and analysis☆29Jul 21, 2020Updated 5 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆393Jun 11, 2023Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago