Windows Privilege Escalation
☆73Jun 7, 2022Updated 3 years ago
Alternatives and similar repositories for Juicy-Potato
Users that are interested in Juicy-Potato are comparing it to the libraries listed below
Sorting:
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆168Sep 13, 2021Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆150Nov 22, 2023Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Jan 18, 2023Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆71Oct 2, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Personally developed tools for buffer overflow attacks☆24Sep 25, 2022Updated 3 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆21Jul 18, 2023Updated 2 years ago
- ☆184May 29, 2023Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,158Jan 9, 2021Updated 5 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆23Sep 4, 2021Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- ☆295Mar 31, 2022Updated 3 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆23Feb 8, 2023Updated 3 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated 11 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- PassLock is a highly secured password manager that encrypts passwords using Advanced Encryption Standards (AES)☆64Feb 5, 2024Updated 2 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Apr 19, 2025Updated 10 months ago
- Windows Local Privilege Escalation from Service Account to System☆917Feb 23, 2020Updated 6 years ago
- Modifying SweetPotato to support load shellcode and webshell☆787Jun 2, 2021Updated 4 years ago
- Big Data tool for metadata extraction (Exif), enrichment (using DeepLearning) and analysis☆29Jul 21, 2020Updated 5 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- Performing Indirect Clean Syscalls☆604Apr 19, 2023Updated 2 years ago