MadExploits / Privelege-escalationLinks
Localroot Privelege escalation for linux
☆12Updated last year
Alternatives and similar repositories for Privelege-escalation
Users that are interested in Privelege-escalation are comparing it to the libraries listed below
Sorting:
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- PHP lab to test captcha bypassing☆31Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆26Updated 2 years ago
- Gecko Backdoor is a most powerful web php backdoor.☆128Updated 3 weeks ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- A CDN Domain Fronting Tool or Websocket Discovery written in Python☆56Updated 2 years ago
- AutoExploiter Wordpress , Joomla , Drupal☆16Updated 7 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- UAdmin Phishlets for common sites☆14Updated 2 months ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆11Updated last year
- SubDomain Finder☆14Updated 3 years ago
- MASS SMTP VALID INVALID CHECKER.☆20Updated 10 months ago
- Discover Domains Associated with a Reverse IP Lookup☆32Updated 6 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated 2 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Updated 3 years ago
- A powerful reverse shell generator☆44Updated 3 years ago
- An Simple PHP Webshell Manager to bypassed security system☆22Updated last year
- Yet another PHP Obfuscator☆35Updated 9 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆25Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆20Updated 3 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆22Updated 6 months ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- A fast, lightweight botnet written in pure C.☆38Updated 3 years ago
- A program to steal user information through a simple link☆15Updated 2 years ago
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆17Updated 4 months ago