LOCAL ROOT EXPLOITS
☆39Jul 30, 2018Updated 7 years ago
Alternatives and similar repositories for local-root-exploits
Users that are interested in local-root-exploits are comparing it to the libraries listed below
Sorting:
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- A Minecraft Data Pack - Generate Beta-like worlds with modern biomes☆15Dec 20, 2020Updated 5 years ago
- Web Sight Back-end Community Edition☆43Dec 7, 2022Updated 3 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API☆19Mar 2, 2018Updated 8 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- A very usefull cheatsheet for Ansible usage.☆34Feb 21, 2020Updated 6 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- ☆24Jan 31, 2024Updated 2 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Android-MediaStreamingServer was written in kotlin using NanoHTTPD library. This Server can support video streaming with full range(seek)…☆12Nov 27, 2020Updated 5 years ago
- Winhttpclient is an interface which packaged with WinHTTP API written in c.☆13Jan 22, 2023Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure mo…☆39Mar 19, 2019Updated 6 years ago
- A Python command-line tool for automatically detecting and cropping portrait photos with transparent backgrounds.☆11Aug 13, 2025Updated 6 months ago
- Parallel Programming Fall 2022 @ NYCU☆11Jan 12, 2023Updated 3 years ago
- A node.js NTLM client with support for NTLM and NTLMv2 authentication☆10Feb 12, 2024Updated 2 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- scrapy bitcoin scripts☆13Dec 27, 2021Updated 4 years ago
- Library for forward-error-correction with Reed-Solomon codes☆13Jul 3, 2020Updated 5 years ago
- Creating a virtual machine template under Ubuntu Server 24.04 LTS from ISO file with Packer using VMware Workstation☆10Jul 28, 2025Updated 7 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆26Feb 28, 2026Updated last week
- A save editor/dumper for bitlife save files and encrypted var files.☆13Aug 23, 2025Updated 6 months ago
- This is small but powerful lib with which one can manage runtime permissions 1 line.☆10Jul 5, 2020Updated 5 years ago