You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[homepage]https://github.com/BeichenDream/GodPotato[/homepage]
[tags]windows,privesc[/tags]
[short_descr]Privilege escalation tool for Windows.[/short_descr]
[long_descr]Potato privilege escalation is usually used when we obtain WEB/database privileges. We can elevate a service user with low privileges to "NT AUTHORITY\SYSTEM" privileges. However, the historical Potato has no way to run on the latest Windows system. When I was researching DCOM, I found a new method that can perform privilege escalation. There are some defects in rpcss when dealing with oxid, and rpcss is a service that must be opened by the system. , so it can run on almost any Windows OS, I named it GodPotato[/long_descr]
[image]https://raw.githubusercontent.com/gwen001/offsectools_www/main/0d513f948a79748d642639470fbd3a91.png[/image]
The text was updated successfully, but these errors were encountered:
[homepage]https://github.com/BeichenDream/GodPotato[/homepage]
[tags]windows,privesc[/tags]
[short_descr]Privilege escalation tool for Windows.[/short_descr]
[long_descr]Potato privilege escalation is usually used when we obtain WEB/database privileges. We can elevate a service user with low privileges to "NT AUTHORITY\SYSTEM" privileges. However, the historical Potato has no way to run on the latest Windows system. When I was researching DCOM, I found a new method that can perform privilege escalation. There are some defects in rpcss when dealing with oxid, and rpcss is a service that must be opened by the system. , so it can run on almost any Windows OS, I named it GodPotato[/long_descr]
[image]https://raw.githubusercontent.com/gwen001/offsectools_www/main/0d513f948a79748d642639470fbd3a91.png[/image]
The text was updated successfully, but these errors were encountered: