Frissi0n / GTFONowLinks
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
☆621Updated 9 months ago
Alternatives and similar repositories for GTFONow
Users that are interested in GTFONow are comparing it to the libraries listed below
Sorting:
- Penelope Shell Handler☆1,023Updated last week
- Script for generating revshells☆476Updated 11 months ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆401Updated 7 months ago
- Pentest Report Generator☆425Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆798Updated 4 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆719Updated 3 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆946Updated 2 weeks ago
- A RedTeam Toolkit☆405Updated last week
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆279Updated 4 months ago
- A python tool to automate KeePass discovery and secret extraction.☆500Updated 8 months ago
- improving...☆219Updated 3 weeks ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆576Updated 3 weeks ago
- Simple and accurate guide for linux privilege escalation tactics☆233Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆400Updated 7 months ago
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆814Updated last year
- Active Directory pentesting mind map☆449Updated 2 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆211Updated last year
- A simple tool for bypassing file upload restrictions.☆874Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆593Updated 9 months ago
- PDF Files for Pentesting☆615Updated 10 months ago
- Certified Red Team Operator☆423Updated 3 years ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆473Updated 5 months ago
- Collection of reverse shells for red team operations.☆510Updated 5 months ago
- Original PoC for CVE-2023-32784☆646Updated 2 years ago
- ☆431Updated last year
- PEN-300 collection to help you on your exam.☆642Updated last week
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆370Updated 2 years ago
- Hash type identifier (CLI & lib)☆894Updated this week
- Tips on how to write exploit scripts (faster!)☆511Updated last year