lypd0 / DeadPotatoLinks
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.
☆426Updated 10 months ago
Alternatives and similar repositories for DeadPotato
Users that are interested in DeadPotato are comparing it to the libraries listed below
Sorting:
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆524Updated 2 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆545Updated last month
- Extract and execute a PE embedded within a PNG file using an LNK file.☆422Updated 7 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆523Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆410Updated 11 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆520Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆597Updated last month
- Amsi Bypass payload that works on Windwos 11☆378Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆615Updated last month
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆602Updated last year
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆454Updated last month
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆308Updated 3 months ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆365Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆491Updated last month
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆558Updated last year
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆417Updated 10 months ago
- shellcode loader for your evasion needs☆331Updated last month
- Bypassing UAC with SSPI Datagram Contexts☆442Updated last year
- Evasive shellcode loader☆369Updated 8 months ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆380Updated 8 months ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆190Updated 11 months ago
- UAC Bypass By Abusing Kerberos Tickets☆498Updated last year
- ☆397Updated 6 months ago
- Escalate Service Account To LocalSystem via Kerberos☆395Updated last year
- Windows remote execution multitool☆563Updated 2 weeks ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆297Updated last year
- A Windows potato to privesc☆373Updated 10 months ago
- POC exploit for CVE-2024-49138☆249Updated 4 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆559Updated 5 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 10 months ago