MadExploits / Privelege-escalationLinks
Localroot Privelege escalation for linux
☆12Updated last year
Alternatives and similar repositories for Privelege-escalation
Users that are interested in Privelege-escalation are comparing it to the libraries listed below
Sorting:
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆27Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆25Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- PHP lab to test captcha bypassing☆30Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆13Updated last year
- An Simple PHP Webshell Manager to bypassed security system☆21Updated last year
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Updated 3 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- UAdmin Phishlets for common sites☆15Updated 6 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆26Updated last year
- AutoExploiter Wordpress , Joomla , Drupal☆17Updated 7 years ago
- Recon (Whois)☆15Updated 2 years ago
- A powerful reverse shell generator☆45Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 3 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 10 months ago
- SubDomain Finder☆13Updated 4 years ago
- MASS SMTP VALID INVALID CHECKER.☆23Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Updated 8 months ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Updated 3 years ago
- Gecko Backdoor is a most powerful web php backdoor.☆129Updated 4 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Updated 3 months ago
- ☆14Updated 9 months ago
- shellcode transformation tool for YARA evasion☆38Updated this week