首页提权EXP列表
  • SigmaPotato

    SeImpersonateprivilegeescalationtoolforWindows8-11andWindowsServer2012-2022withextensivePowerShelland.NETreflectionsupport.
  • Local Privilege Escalation via AppX RPC coercion

    ThistoolleveragesavulnerabilityIdiscoveredinWindows10/11affectingtheAppXMS-RPCinterface.Specifically,thisaffectstheAppXDeploymentService'sAppXDeploymentServer.dllwhichexposesaLocalRPCinterfacebydefaul…
  • SigmaPotato

    ThisgaudyrepositoryisaderivativeoftheGodPotatoproject,aimingtoenhancetheoriginalwork'sfunctionalityanduser-friendliness.Withmybread-and-buttergenerallybeingPowerShellimplementationandvisualformatting,…
  • CVE-2024-1086

    CVE-2024-1086UniversallocalprivilegeescalationProof-of-ConceptexploitforCVE-2024-1086,workingonmostLinuxkernelsbetweenv5.14andv6.6,includingDebian,Ubuntu,andKernelCTF.Thesuccessrateis99.4%inKernelCTFi…
  • GodPotato

    BasedonthehistoryofPotatoprivilegeescalationfor6years,fromthebeginningofRottenPotatototheendofJuicyPotatoNG,IdiscoveredanewtechnologybyresearchingDCOM,whichenablesprivilegeescalationinWindows2012-Wind…
  • Coerced potato

    FromPatate(LOCAL/NETWORKSERVICE)toSYSTEMbyabusing SeImpersonatePrivilege onWindows10,Windows11andServer2022.Formoreinformation: https://blog.hackvens.fr/articles/CoercedPotato.html …
  • Coerced Potato Reflective DLL

    CoercedPotatoReflectiveDLLPrivilegeescalationfromNTServicetoSYSTEMusingSeImpersonateTokenprivilegeandMS-RPRNfunctions.Heavilybasedon https://github.com/Prepouce/CoercedPotatoReflectiveLoaderfrom&…
  • Windows potato to privesc

     FromPatate(LOCAL/NETWORKSERVICE)toSYSTEMbyabusingSeImpersonatePrivilege onWindows10,Windows11andServer2022.Formoreinformation: https://blog.hackvens.fr/articles/CoercedPotato.html …
  • Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege

    CoercedPotatoReflectiveDLL PrivilegeescalationfromNTServicetoSYSTEMusingSeImpersonateTokenprivilegeandMS-RPRNfunctions.Heavilybasedon https://github.com/Prepouce/CoercedPotatoReflectiveLoade…
  • SharpEfsPotato

    SharpEfs土豆使用EfsRpc从SeImpersonatePrivilege进行本地权限提升。由@EthicalChaos的SweetPotato和@cube0x0的SharpSystemTriggers/SharpEfsTrigger构建。用法C:\temp>SharpEfsPotato.exe-hSharpEfsPotatoby@bugch3ckLocalprivilegeescalat…