APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
β16Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bashβ29Updated 3 years ago
- A python approach to interacting with web shells.β30Updated 4 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.β39Updated last year
- β27Updated 5 years ago
- β30Updated 2 years ago
- Small python script wrapper for automating hashcat commandsβ38Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020β¦β65Updated 5 years ago
- Bifrost C2. Open-source post-exploitation using Discord APIβ48Updated 4 years ago
- Reverse Shell troll softwareβ12Updated 6 years ago
- Collection of extra pentest tools for Kali Linuxβ112Updated 2 months ago
- This contains common OSCP local exploits and enumeration scriptsβ11Updated 10 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- Zero-Day Code Injection and Persistence Techniqueβ34Updated 8 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3β20Updated 3 years ago
- Modular framework to exploit UPS devicesβ66Updated 2 years ago
- Apache Tomcat Manager API WAR Shell Uploadβ33Updated 5 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β40Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systemsβ44Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated 2 years ago
- Bash script to generate reverse shell payloadsβ19Updated 2 years ago
- Random Exploitsβ50Updated 2 years ago
- VLAN attacks toolkitβ12Updated 3 years ago
- Super organized and flexible script for sending phishing campaignsβ56Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtubeβ107Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characteβ¦β24Updated 6 years ago
- Small python script to look for common vulnerabilities on SMTP server.β49Updated last year
- Automate Blind SQL Injection with Python.β22Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....β26Updated 7 years ago