lypd0 / DeadPotatoLinks
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
☆454Updated last year
Alternatives and similar repositories for DeadPotato
Users that are interested in DeadPotato are comparing it to the libraries listed below
Sorting:
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆535Updated 2 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆567Updated 8 months ago
- PoC Exploit for the NTLM reflection SMB flaw.☆647Updated this week
- AdaptixFramework Extension Kit☆360Updated 2 weeks ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆598Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆504Updated 8 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆449Updated last year
- Windows remote execution multitool☆776Updated 3 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆622Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆390Updated 10 months ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆207Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆584Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆507Updated 2 years ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆442Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆633Updated 8 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆590Updated last year
- A Windows potato to privesc☆389Updated last year
- Stealthily inject shellcode into an executable☆440Updated 3 months ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆450Updated 2 years ago
- This is the tool to dump the LSASS process on modern Windows 11☆542Updated 2 months ago
- Escalate Service Account To LocalSystem via Kerberos☆402Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆667Updated 5 months ago
- Awesome AV/EDR/XDR Bypass Tips☆284Updated 2 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆532Updated 2 months ago
- Shellcode loader generator with multiples features☆507Updated last year
- shellcode loader for your evasion needs☆352Updated 8 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆550Updated this week
- Amsi Bypass payload that works on Windwos 11☆378Updated 2 years ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆392Updated 9 months ago