APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
☆17Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- ☆20Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated last year
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- A python approach to interacting with web shells.☆31Updated 4 years ago
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆25Updated last week
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆10Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 3 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆44Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Compiled binaries of various security tools☆14Updated 4 years ago
- Pentesting notes☆17Updated 4 months ago
- Enumeration & fingerprint tool☆25Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago