lypd0 / DeadPotatoLinks
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
☆430Updated 11 months ago
Alternatives and similar repositories for DeadPotato
Users that are interested in DeadPotato are comparing it to the libraries listed below
Sorting:
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆525Updated 2 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆424Updated 8 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆548Updated last month
- Collection of UAC Bypass Techniques Weaponized as BOFs☆525Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆603Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆460Updated last month
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆376Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆603Updated 2 months ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆192Updated 11 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆316Updated 3 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆563Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆413Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆498Updated last year
- PoC Exploit for the NTLM reflection SMB flaw.☆437Updated last month
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆328Updated 3 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆557Updated last year
- shellcode loader for your evasion needs☆332Updated 2 months ago
- Awesome AV/EDR/XDR Bypass Tips☆275Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆624Updated 2 months ago
- Escalate Service Account To LocalSystem via Kerberos☆395Updated last year
- Windows remote execution multitool☆618Updated last month
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆418Updated 11 months ago
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- Evasive shellcode loader☆375Updated 9 months ago
- COM ViewLogger — new malware keylogging technique☆386Updated 6 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆299Updated 2 months ago
- Go shellcode loader that combines multiple evasion techniques☆374Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆256Updated 11 months ago
- ☆401Updated 7 months ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆441Updated 2 years ago