5H311-1NJ3C706 / local-root-exploitsView external linksLinks
LOCAL ROOT EXPLOITS
☆39Jul 30, 2018Updated 7 years ago
Alternatives and similar repositories for local-root-exploits
Users that are interested in local-root-exploits are comparing it to the libraries listed below
Sorting:
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- A Minecraft Data Pack - Generate Beta-like worlds with modern biomes☆15Dec 20, 2020Updated 5 years ago
- Web Sight Back-end Community Edition☆43Dec 7, 2022Updated 3 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API☆19Mar 2, 2018Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Oct 27, 2021Updated 4 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- A very usefull cheatsheet for Ansible usage.☆34Feb 21, 2020Updated 5 years ago
- unix SSH post-exploitation 1337 tool☆142Dec 16, 2018Updated 7 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Android-MediaStreamingServer was written in kotlin using NanoHTTPD library. This Server can support video streaming with full range(seek)…☆12Nov 27, 2020Updated 5 years ago
- Winhttpclient is an interface which packaged with WinHTTP API written in c.☆12Jan 22, 2023Updated 3 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Jun 30, 2018Updated 7 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 7 years ago
- Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure mo…☆39Mar 19, 2019Updated 6 years ago
- DEScrypt CPU Collision Cracker☆51Apr 14, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- This is small but powerful lib with which one can manage runtime permissions 1 line.☆10Jul 5, 2020Updated 5 years ago
- Parallel Programming Fall 2022 @ NYCU☆11Jan 12, 2023Updated 3 years ago
- A save editor/dumper for bitlife save files and encrypted var files.☆13Aug 23, 2025Updated 5 months ago
- A node.js NTLM client with support for NTLM and NTLMv2 authentication☆10Feb 12, 2024Updated 2 years ago
- Library for forward-error-correction with Reed-Solomon codes☆13Jul 3, 2020Updated 5 years ago
- ☆11Apr 21, 2023Updated 2 years ago
- scrapy bitcoin scripts☆13Dec 27, 2021Updated 4 years ago