IvanGlinkin / AutoSUID
AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way for further escalating the privileges.
☆374Updated 9 months ago
Alternatives and similar repositories for AutoSUID:
Users that are interested in AutoSUID are comparing it to the libraries listed below
- Active Directory Labs/exams Review☆251Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆295Updated last year
- Red Team Attack Lab for TTP testing & research☆562Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 3 years ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆410Updated 3 months ago
- Active Directory Wordlists☆89Updated 4 years ago
- Just another Powerview alternative☆555Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆504Updated 2 months ago
- Course repository for PowerShell for Pentesters Course☆426Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,003Updated 5 months ago
- My subdomain enumeration script. It's unique in the way it is built upon.☆671Updated 5 months ago
- Powershell tool to automate Active Directory enumeration.☆1,037Updated last month
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 5 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆429Updated last year
- ☆258Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,059Updated 8 months ago
- Maximizing BloodHound. Max is a good boy.☆503Updated 2 weeks ago
- An Office365 User Attack Tool☆630Updated 10 months ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆466Updated last year
- Vulnerability assessment and penetration testing automation and reporting platform for teams.☆440Updated last month
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆368Updated 4 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆334Updated 5 months ago
- Kerberoast with ACL abuse capabilities☆391Updated last month
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆386Updated 2 weeks ago
- Script for generating revshells☆460Updated 4 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆209Updated 2 years ago
- ☆316Updated 2 weeks ago
- ☆213Updated 4 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆682Updated 2 weeks ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆780Updated 9 months ago