Category: Post Exploitation

Endpoint Detection

EDRHunt v1.4.7 releases: Scan installed EDRs and AVs on Windows

EDRHunt EDRHunt scans Windows services, drivers, processes, the registry for installed EDRs (Endpoint Detection And Response). Detections EDR Detections Currently Available Windows Defender Kaspersky Security Symantec Security Crowdstrike Security Mcafee Security Cylance Security Carbon...

Windows privilege escalation tool

GodPotato: Windows privilege escalation tool

GodPotato Based on the history of Potato privilege escalation for 6 years, from the beginning of RottenPotato to the end of JuicyPotatoNG, I discovered a new technology by researching DCOM, which enables privilege escalation...

Starkiller

Starkiller v2.2 releases: Frontend for PowerShell Empire

Starkiller Starkiller is a Frontend for Powershell Empire. It is an Electron application written in VueJS. Multi-user GUI application for interfacing with the Empire C2 server from any computer. Starkiller represents a huge step forward...

Handle hijacking

Handle-Ripper: Windows handle hijacker

Handle-Ripper Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system without permission. It is a type of privilege escalation attack in which a...