APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
☆16Updated 3 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- This contains common OSCP local exploits and enumeration scripts☆12Updated 10 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- ☆28Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 5 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Compiled binaries of various security tools☆14Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- VLAN attacks toolkit☆12Updated 3 years ago
- Runs sshd as a unprivileged user for persistence☆11Updated 6 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- ☆30Updated 2 years ago
- visually see issues with supported cipher suites☆17Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Updated 3 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Updated 11 months ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago