APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
☆16Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Compiled binaries of various security tools☆14Updated 4 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 3 years ago
- VLAN attacks toolkit☆12Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29Updated 7 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Updated 10 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 4 years ago
- ☆27Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- ☆30Updated 2 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 4 years ago