APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
☆16Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- ☆27Updated 5 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Repository of tools used in my blog☆52Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆19Updated 4 years ago
- ☆29Updated 2 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- VLAN attacks toolkit☆14Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Random Exploits☆50Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago