micahvandeusen / GenericPotatoLinks
Impersonating authentication over HTTP and/or named pipes.
☆143Updated 4 years ago
Alternatives and similar repositories for GenericPotato
Users that are interested in GenericPotato are comparing it to the libraries listed below
Sorting:
- Weaponizing for privileged file writes bugs with windows problem reporting☆243Updated 3 years ago
- Loads a custom dll in system32 via diaghub.☆82Updated 5 years ago
- Python implementation for PetitPotam☆218Updated 4 years ago
- MS-FSRVP coercion abuse PoC☆303Updated 4 years ago
- Run Rubeus via Rundll32☆204Updated 5 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆89Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆204Updated 4 years ago
- Proof-of-concept tools for my AD Forest trust research☆230Updated last year
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Updated 3 years ago
- C# version of Powermad☆170Updated 2 years ago
- AV Evasion Techniques☆82Updated 3 years ago
- Buggy script to play with GPOs☆121Updated last year
- Simple APPLocker bypass summary☆47Updated 7 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆70Updated 5 years ago
- SeRestorePrivilege to SYSTEM☆132Updated 4 years ago
- python spraying tools based on impacket lib☆55Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A variety of AV evasion techniques written in C# for practice.☆98Updated 4 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆312Updated 2 years ago
- ☆249Updated 2 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆73Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆192Updated 4 years ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- ☆46Updated 8 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆212Updated last year