lypd0 / DeadPotatoLinks
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
☆440Updated last year
Alternatives and similar repositories for DeadPotato
Users that are interested in DeadPotato are comparing it to the libraries listed below
Sorting:
- Extract and execute a PE embedded within a PNG file using an LNK file.☆445Updated 10 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆527Updated 4 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆556Updated 3 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆552Updated last year
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆197Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆483Updated 4 months ago
- PoC Exploit for the NTLM reflection SMB flaw.☆496Updated 3 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆404Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆498Updated 2 years ago
- AdaptixFramework Extension Kit☆248Updated last week
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆607Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆332Updated 6 months ago
- Awesome AV/EDR/XDR Bypass Tips☆281Updated 2 years ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆423Updated last year
- shellcode loader for your evasion needs☆341Updated 4 months ago
- Windows remote execution multitool☆682Updated this week
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆615Updated 4 months ago
- Escalate Service Account To LocalSystem via Kerberos☆398Updated 2 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆569Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆576Updated last year
- Shellcode loader generator with multiples features☆494Updated 8 months ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆642Updated last month
- Evasive shellcode loader☆384Updated 11 months ago
- Amsi Bypass payload that works on Windwos 11☆376Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆444Updated 2 years ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆433Updated last year
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆373Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆507Updated 4 months ago
- A command and control framework written in rust.☆370Updated 2 weeks ago