privilege escalation by piggy-backing user sudo requests
☆16Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Jul 10, 2020Updated 5 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- This repository contains code which allows to fetch your activity data from strava☆14Oct 24, 2024Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Android APK Resigner☆10Jul 13, 2016Updated 9 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- A multi rom module for the Interton VC4000 gaming console☆10Mar 3, 2017Updated 9 years ago
- Turn your pain cave fans into smart fans!☆14Dec 24, 2023Updated 2 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Bikebuds: A Social Cycling Club☆11May 11, 2023Updated 2 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- ☆16Updated this week
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 3 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆10Dec 8, 2022Updated 3 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 11 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Hackintosh OpenCore HP EliteBook 840 G1☆11Apr 22, 2022Updated 3 years ago
- Companies House csv File To MySQL Database☆12May 24, 2023Updated 2 years ago