APTy / sudo-piggybackLinks
privilege escalation by piggy-backing user sudo requests
β17Updated 2 years ago
Alternatives and similar repositories for sudo-piggyback
Users that are interested in sudo-piggyback are comparing it to the libraries listed below
Sorting:
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- Reverse Shell troll softwareβ12Updated 5 years ago
- Bash script to generate reverse shell payloadsβ19Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administratorβ¦β14Updated 6 years ago
- Enumeration & fingerprint toolβ25Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Apache Tomcat Manager API WAR Shell Uploadβ34Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.β24Updated 4 years ago
- β27Updated 4 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is ablβ¦β17Updated 4 years ago
- This contains common OSCP local exploits and enumeration scriptsβ11Updated 9 years ago
- Windows Keylogger in C++β19Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives uβ¦β10Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago
- β19Updated 3 years ago
- For Interview, OSCP proof of concept code during the course.β17Updated 5 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated last year
- Internal Network Penetration Test Playbookβ21Updated 3 years ago
- β22Updated 8 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. Theβ¦β11Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Scriptβ13Updated 2 years ago
- Zero-Day Code Injection and Persistence Techniqueβ33Updated 8 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.β18Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β40Updated last year
- Automated Pentest Recon Scannerβ14Updated 7 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.β23Updated 3 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)β13Updated last year
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago