Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/CCob/SweetPotato
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
https://github.com/CCob/SweetPotato
Last synced: 21 days ago
JSON representation
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
- Host: GitHub
- URL: https://github.com/CCob/SweetPotato
- Owner: CCob
- Created: 2020-04-12T17:40:03.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-09-04T17:09:30.000Z (3 months ago)
- Last Synced: 2024-11-20T20:25:09.210Z (22 days ago)
- Language: C#
- Size: 836 KB
- Stars: 1,625
- Watchers: 17
- Forks: 218
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- Security: Security/Privilege.cs
Awesome Lists containing this project
- awesome-hacking-lists - CCob/SweetPotato - Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019 (C# #)
README
# SweetPotato
### A collection of various native Windows privilege escalation techniques from service accounts to SYSTEM```
SweetPotato by @_EthicalChaos_
Orignal RottenPotato code and exploit by @foxglovesec
Weaponized JuciyPotato by @decoder_it and @Guitro along with BITS WinRM discovery
PrintSpoofer discovery and original exploit by @itm4n
EfsRpc built on EfsPotato by @zcgonvh and PetitPotam by @topotam
-c, --clsid=VALUE CLSID (default BITS:
4991D34B-80A1-4291-83B6-3328366B9097)
-m, --method=VALUE Auto,User,Thread (default Auto)
-p, --prog=VALUE Program to launch (default cmd.exe)
-a, --args=VALUE Arguments for program (default null)
-e, --exploit=VALUE Exploit mode
[DCOM|WinRM|EfsRpc|PrintSpoofer(default)]
-l, --listenPort=VALUE COM server listen port (default 6666)
-h, --help Display this help
```