Skip to content

Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019

Notifications You must be signed in to change notification settings

CCob/SweetPotato

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SweetPotato

A collection of various native Windows privilege escalation techniques from service accounts to SYSTEM

SweetPotato by @_EthicalChaos_ Orignal RottenPotato code and exploit by @foxglovesec Weaponized JuciyPotato by @decoder_it and @Guitro along with BITS WinRM discovery PrintSpoofer discovery and original exploit by @itm4n EfsRpc built on EfsPotato by @zcgonvh and PetitPotam by @topotam -c, --clsid=VALUE CLSID (default BITS: 4991D34B-80A1-4291-83B6-3328366B9097) -m, --method=VALUE Auto,User,Thread (default Auto) -p, --prog=VALUE Program to launch (default cmd.exe) -a, --args=VALUE Arguments for program (default null) -e, --exploit=VALUE Exploit mode [DCOM|WinRM|EfsRpc|PrintSpoofer(default)] -l, --listenPort=VALUE COM server listen port (default 6666) -h, --help Display this help 

About

Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019

Resources

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

 

Packages

No packages published

Languages