APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
☆16Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- A python approach to interacting with web shells.☆30Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Updated 7 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Apache Tomcat Manager API WAR Shell Upload☆34Updated 5 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 3 years ago
- ☆29Updated 2 years ago
- Repository of tools used in my blog☆52Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 3 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago