zcgonvh / DCOMPotatoView external linksLinks
Some Service DCOM Object and SeImpersonatePrivilege abuse.
☆372Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for DCOMPotato
Users that are interested in DCOMPotato are comparing it to the libraries listed below
Sorting:
- PrintNotifyPotato☆539Dec 2, 2022Updated 3 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆400Feb 6, 2023Updated 3 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆817Dec 14, 2023Updated 2 years ago
- Misc TaskScheduler Plays☆238Sep 27, 2022Updated 3 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆196Jun 18, 2024Updated last year
- Windows Token Stealing Expert☆485Nov 24, 2023Updated 2 years ago
- dump lsass进程工具☆561Jul 20, 2023Updated 2 years ago
- 获取服务器或域控登录日志☆276Sep 8, 2023Updated 2 years ago
- A BOF to determine Windows Defender exclusions.☆253Jun 25, 2023Updated 2 years ago
- 利用NTLM Hash读取Exchange邮件☆441Jan 7, 2025Updated last year
- 提取DC日志,快速获取域用户对应IP地址☆308Mar 21, 2022Updated 3 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆338Oct 17, 2022Updated 3 years ago
- Credential Guard Bypass Via Patching Wdigest Memory☆335Feb 3, 2023Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆374Dec 26, 2022Updated 3 years ago
- Execute unmanaged Windows executables in CobaltStrike Beacons☆714Mar 4, 2023Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆508Aug 10, 2023Updated 2 years ago
- Exchange 服务器安全性的辅助测试工具☆332Jul 21, 2023Updated 2 years ago
- New generation of wmiexec.py☆1,255Jan 5, 2026Updated last month
- ☆1,117Jan 6, 2026Updated last month
- HVNC for Cobalt Strike☆1,297Dec 7, 2023Updated 2 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- RPC远程主机信息匿名扫描工具☆317Sep 30, 2022Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆938Nov 12, 2022Updated 3 years ago
- 提取域控日志,支持远程提取☆171Mar 17, 2025Updated 10 months ago
- ☆705Nov 7, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆402Sep 14, 2023Updated 2 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆278Apr 4, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Memshell☆292Dec 7, 2021Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,397Dec 16, 2021Updated 4 years ago
- 一款针对Vcenter的综合利用工具,包含目 前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆1,464Apr 25, 2024Updated last year
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆731Sep 1, 2021Updated 4 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆741Jul 22, 2023Updated 2 years ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,465Jan 20, 2025Updated last year
- SharpSQLTools 和@Rcoil一起写的小工具,可上传下载文件,xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作。☆965Aug 5, 2021Updated 4 years ago
- Coerce Windows machines auth via MS-EVEN☆171Jan 17, 2024Updated 2 years ago
- ☆95Nov 26, 2022Updated 3 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆366Apr 19, 2023Updated 2 years ago