Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/CCob/SweetPotato
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
https://github.com/CCob/SweetPotato
Last synced: 3 months ago
JSON representation
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
- Host: GitHub
- URL: https://github.com/CCob/SweetPotato
- Owner: CCob
- Created: 2020-04-12T17:40:03.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-01-19T15:13:57.000Z (10 months ago)
- Last Synced: 2024-05-02T00:48:39.370Z (6 months ago)
- Language: C#
- Size: 859 KB
- Stars: 1,463
- Watchers: 19
- Forks: 206
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- Security: Security/Privilege.cs
Awesome Lists containing this project
- awesome-hacking-lists - CCob/SweetPotato - Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019 (C# #)
README
# SweetPotato
### A collection of various native Windows privilege escalation techniques from service accounts to SYSTEM```
SweetPotato by @_EthicalChaos_
Orignal RottenPotato code and exploit by @foxglovesec
Weaponized JuciyPotato by @decoder_it and @Guitro along with BITS WinRM discovery
PrintSpoofer discovery and original exploit by @itm4n
EfsRpc built on EfsPotato by @zcgonvh and PetitPotam by @topotam
-c, --clsid=VALUE CLSID (default BITS:
4991D34B-80A1-4291-83B6-3328366B9097)
-m, --method=VALUE Auto,User,Thread (default Auto)
-p, --prog=VALUE Program to launch (default cmd.exe)
-a, --args=VALUE Arguments for program (default null)
-e, --exploit=VALUE Exploit mode
[DCOM|WinRM|EfsRpc|PrintSpoofer(default)]
-l, --listenPort=VALUE COM server listen port (default 6666)
-h, --help Display this help
```