Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit.

Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit.

Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit. Tater is mainly pieced together from existing Inveigh code.

Notes
Use caution, this is still very much in a proof of concept stage. It’s only been tested on Windows 7. It’s also missing some of the advanced features found in Potato.
The most likely thing to go wrong is that the HTTP listener will not release the port 80 binding on exit. If this happens, closing out your PowerShell process will remove the binding.

Example usage Tater.ps1

Example usage Tater.ps1

Example usage :

Tater.ps1 Script:

Source : https://github.com/Kevin-Robertson