JameelNabbo / Linux-advanced-privilege-escalationLinks
☆12Updated 7 years ago
Alternatives and similar repositories for Linux-advanced-privilege-escalation
Users that are interested in Linux-advanced-privilege-escalation are comparing it to the libraries listed below
Sorting:
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Journey to conquer the OSCP!☆13Updated 6 years ago
- ☆22Updated 11 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ☆1Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Small POC in powershell exploiting hardlinks during the VM deletion process☆47Updated 5 years ago
- ☆23Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Work in Progress repo☆14Updated 6 years ago
- ☆20Updated 5 years ago
- Offline Security Focus Database☆31Updated 12 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- ☆36Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago