IvanGlinkin / AutoSUID
AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way for further escalating the privileges.
☆375Updated 11 months ago
Alternatives and similar repositories for AutoSUID:
Users that are interested in AutoSUID are comparing it to the libraries listed below
- ☆318Updated 2 months ago
- Active Directory Labs/exams Review☆253Updated 4 years ago
- Red Team Attack Lab for TTP testing & research☆564Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆298Updated last year
- PeTeReport is an open-source application vulnerability reporting tool.☆496Updated 9 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆528Updated last year
- ☆518Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,056Updated 2 weeks ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆383Updated 2 months ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆414Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆539Updated 4 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆265Updated 2 years ago
- Vulnerability assessment and penetration testing automation and reporting platform for teams.☆445Updated 3 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- Course repository for PowerShell for Pentesters Course☆429Updated 3 years ago
- ☆266Updated last year
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆342Updated 7 months ago
- A RedTeam Toolkit☆394Updated this week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆627Updated 9 months ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆346Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 3 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆389Updated 2 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆325Updated 3 weeks ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆469Updated last year
- Identify privilege escalation paths within and across different clouds☆685Updated 4 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆863Updated last year
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- Script for generating revshells☆466Updated 6 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆154Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,104Updated 10 months ago