k4sth4 / Juicy-PotatoView external linksLinks
Windows Privilege Escalation
☆70Jun 7, 2022Updated 3 years ago
Alternatives and similar repositories for Juicy-Potato
Users that are interested in Juicy-Potato are comparing it to the libraries listed below
Sorting:
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆164Sep 13, 2021Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- SeManageVolumePrivilege to SYSTEM☆146Nov 22, 2023Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Jan 18, 2023Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Oct 2, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆20Jul 18, 2023Updated 2 years ago
- Personally developed tools for buffer overflow attacks☆24Sep 25, 2022Updated 3 years ago
- ☆179May 29, 2023Updated 2 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆22Sep 4, 2021Updated 4 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,148Jan 9, 2021Updated 5 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated last year
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- ☆291Mar 31, 2022Updated 3 years ago
- PassLock is a highly secured password manager that encrypts passwords using Advanced Encryption Standards (AES)☆65Feb 5, 2024Updated 2 years ago
- Acunetix automate telegram bot☆10Jul 19, 2024Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- Windows Local Privilege Escalation from Service Account to System☆914Feb 23, 2020Updated 5 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆78Apr 19, 2025Updated 9 months ago
- Modifying SweetPotato to support load shellcode and webshell☆788Jun 2, 2021Updated 4 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- Big Data tool for metadata extraction (Exif), enrichment (using DeepLearning) and analysis☆29Jul 21, 2020Updated 5 years ago
- Performing Indirect Clean Syscalls☆603Apr 19, 2023Updated 2 years ago
- ☆35May 31, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago