APTy / sudo-piggyback
privilege escalation by piggy-backing user sudo requests
β17Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback:
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
- An automated e-mail OSINT toolβ21Updated 3 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- Bash script to generate reverse shell payloadsβ19Updated last year
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overfβ¦β18Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β39Updated last year
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....β25Updated 7 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practiceβ29Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.β12Updated 2 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Conditionβ25Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!β19Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ21Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"β27Updated 7 years ago
- Generate Undetectable Metasploit Payload in a simple wayβ38Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- Brute forcing login pages with SQL Injection queries with cURLβ20Updated last year
- Miscellaneous tools for BloodHoundβ18Updated 3 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is ablβ¦β17Updated 4 years ago
- Pentesting notesβ17Updated 2 months ago
- β29Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,β¦β21Updated 2 years ago
- Useful scripts for pen testing. Require modification to runβ13Updated 4 years ago
- CATANA - CUT your Wordlist!β14Updated 2 years ago
- A reverse TCP payload and listener both written in python3.β30Updated 11 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7Updated 3 years ago
- Reverse Shell troll softwareβ12Updated 5 years ago
- Automated Pentest Recon Scannerβ14Updated 7 years ago
- Dehashed API CLIβ20Updated 4 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a β¦β16Updated 9 months ago