CyberOne-TeamARES / FallOfSudoLinks
Pwning Sudo Rules
☆24Updated 3 years ago
Alternatives and similar repositories for FallOfSudo
Users that are interested in FallOfSudo are comparing it to the libraries listed below
Sorting:
- Tool to enable blind sql injection attacks against websockets using sqlmap☆61Updated last month
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Automate converting webshells into reverse shells.☆69Updated 2 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Detect common NFS server misconfigurations☆61Updated last week
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- ☆27Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Bad scripts I made doing CTF's☆21Updated last year
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- POC for CVE-2024-23897 Jenkins File-Read☆28Updated 3 months ago
- A Moodle Scanner☆42Updated 6 months ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Updated last year
- ☆18Updated 8 months ago
- ☆35Updated 6 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆28Updated 6 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆40Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last year
- ☆25Updated 3 years ago
- ☆40Updated this week
- List of some AD tools I frequently use☆46Updated 4 months ago
- Exploit to dump ipmi hashes☆34Updated 2 years ago