mirror of
https://github.com/m0nad/awesome-privilege-escalation.git
synced 2025-01-03 03:10:54 -05:00
Add SweetPotato to the windows tools list
This commit is contained in:
parent
a2f57d4e6a
commit
11055f28cc
@ -173,6 +173,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info
|
||||
- [RottenPotatoNG](https://github.com/breenmachine/RottenPotatoNG): New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.
|
||||
- [SessionGopher](https://github.com/Arvanaghi/SessionGopher): SessionGopher is a PowerShell tool that finds and decrypts saved session information for remote access tools.
|
||||
- [Sherlock](https://github.com/rasta-mouse/Sherlock/): PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities. (Deprecated)
|
||||
- [SweetPotato](https://github.com/CCob/SweetPotato): Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019 by CCob
|
||||
- [Tater](https://github.com/Kevin-Robertson/Tater): Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit.
|
||||
- [Watson](https://github.com/rasta-mouse/Watson): Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.
|
||||
- [WindowsEnum](https://github.com/absolomb/WindowsEnum): A Powershell Privilege Escalation Enumeration Script.
|
||||
|
Loading…
Reference in New Issue
Block a user