Skip to content

Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019

Notifications You must be signed in to change notification settings

CCob/SweetPotato

Folders and files

NameName
Last commit message
Last commit date

Latest commit

288ceb4 · Sep 4, 2024

History

27 Commits
Sep 4, 2024
Apr 12, 2020
Apr 12, 2020
May 11, 2020
Apr 12, 2020
Apr 12, 2020
May 11, 2020
May 19, 2022
May 13, 2020
May 13, 2020
May 11, 2020
May 11, 2020
May 11, 2020
Aug 19, 2021
May 12, 2020
May 19, 2022
May 19, 2022
May 11, 2020
May 19, 2022
Aug 20, 2021
Aug 20, 2021
Apr 12, 2020
Aug 19, 2021
Aug 20, 2021

Repository files navigation

SweetPotato

A collection of various native Windows privilege escalation techniques from service accounts to SYSTEM

SweetPotato by @_EthicalChaos_
  Orignal RottenPotato code and exploit by @foxglovesec
  Weaponized JuciyPotato by @decoder_it and @Guitro along with BITS WinRM discovery
  PrintSpoofer discovery and original exploit by @itm4n
  EfsRpc built on EfsPotato by @zcgonvh and PetitPotam by @topotam
  -c, --clsid=VALUE          CLSID (default BITS:
                               4991D34B-80A1-4291-83B6-3328366B9097)
  -m, --method=VALUE         Auto,User,Thread (default Auto)
  -p, --prog=VALUE           Program to launch (default cmd.exe)
  -a, --args=VALUE           Arguments for program (default null)
  -e, --exploit=VALUE        Exploit mode
                               [DCOM|WinRM|EfsRpc|PrintSpoofer(default)]
  -l, --listenPort=VALUE     COM server listen port (default 6666)
  -h, --help                 Display this help

About

Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages