0x90 / lpe-arsenalView external linksLinks
Local privilege escalation scripts and tools
☆17Aug 4, 2016Updated 9 years ago
Alternatives and similar repositories for lpe-arsenal
Users that are interested in lpe-arsenal are comparing it to the libraries listed below
Sorting:
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- OG Atomic Red Team☆29Jun 12, 2018Updated 7 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 8 years ago
- Daemon process for the Douane firewall☆19Aug 28, 2018Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54May 8, 2021Updated 4 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆174Oct 11, 2017Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago