MadExploits / Privelege-escalationLinks
Localroot Privelege escalation for linux
☆12Updated last year
Alternatives and similar repositories for Privelege-escalation
Users that are interested in Privelege-escalation are comparing it to the libraries listed below
Sorting:
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- PHP lab to test captcha bypassing☆31Updated last year
- Automate Blind SQL Injection with Python.☆23Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- A CDN Domain Fronting Tool or Websocket Discovery written in Python☆55Updated 2 years ago
- AutoExploiter Wordpress , Joomla , Drupal☆17Updated 7 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆25Updated last year
- A powerful reverse shell generator☆44Updated 3 years ago
- MASS SMTP VALID INVALID CHECKER.☆20Updated 9 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆18Updated 3 years ago
- An Simple PHP Webshell Manager to bypassed security system☆21Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆40Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- Tool to parse Stealer Logs.☆17Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- This tool can generate various types of dropper to hide your main payload☆7Updated 2 years ago
- SubDomain Finder☆14Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Perform With Massive Wordpress Enumeration☆11Updated last year
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shells☆12Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆12Updated 2 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Updated 3 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- UAdmin Phishlets for common sites☆14Updated last month
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Gecko Backdoor is a most powerful web php backdoor.☆127Updated 3 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆11Updated last year