Local privilege escalation scripts and tools
☆17Aug 4, 2016Updated 9 years ago
Alternatives and similar repositories for lpe-arsenal
Users that are interested in lpe-arsenal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Misc scripts and tools for WiFi☆106Jun 18, 2021Updated 4 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Daemon process for the Douane firewall☆19Aug 28, 2018Updated 7 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- OG Atomic Red Team☆30Jun 12, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- A command line Hash Identifying tool.☆101Mar 17, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Fork of Gqrx☆13Aug 16, 2022Updated 3 years ago
- ☆17Oct 5, 2014Updated 11 years ago