APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
β16Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....β25Updated 7 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β40Updated last year
- Automate All Pivoting System Enumeration with this Bash Scriptβ13Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bashβ30Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year
- Apache Tomcat Manager API WAR Shell Uploadβ35Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Modular framework to exploit UPS devicesβ63Updated 2 years ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.β18Updated last year
- This contains common OSCP local exploits and enumeration scriptsβ11Updated 9 years ago
- Compiled binaries of various security toolsβ14Updated 4 years ago
- Collection of extra pentest tools for Kali Linuxβ109Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord APIβ50Updated 4 years ago
- Build interactive map of cameras from Shodanβ23Updated 5 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniquesβ33Updated 9 months ago
- Google Meet Phishing Template For Gophishβ46Updated 3 years ago
- Small python script wrapper for automating hashcat commandsβ38Updated 4 years ago
- VLAN attacks toolkitβ14Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β17Updated last year
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.β39Updated last year
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. Theβ¦β11Updated 3 years ago
- Repository of tools used in my blogβ51Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characteβ¦β25Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 4 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overfβ¦β20Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.β48Updated last year