- Includes a new Potato/Tater (WPAD) Local Privilege Escalation trigger i found in the Office 2016/365 ClickToRun service. ClickToRun issue Reported to MSRC on 4/29/2016 (WPAD/NTLM Loopback relay issue can now be mitigated using MS16-077).
- Includes a bypass method for Amsi (Antimalware Scan Interface) within Windows 10.
- PowerSploit tools updated.
- Updated Mimikatz to latest version.
- Updated MS14-068 Exploit (Kekeo) to latest version.
- New version of Didier Stevens modification of ReactOS Command Prompt incl. Backup Privileges.
- Added Tater, the PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit.
- Added automation to get a SYSTEM command shell using Token Manipulation (Invoke-TokenManipulation).
- Added automation to find machines in the Domain where Domain Admins are logged into (PowerView).
- First Public Release.