ParzivalHack / LPEAssessorLinks
LPEAssessor is a comprehensive Linux privilege escalation assessment tool designed for security professionals, system administrators, and penetration testers. It systematically identifies potential privilege escalation vectors, verifies their exploitability, and provides detailed reports with actionable remediation recommendations.
☆16Updated 10 months ago
Alternatives and similar repositories for LPEAssessor
Users that are interested in LPEAssessor are comparing it to the libraries listed below
Sorting:
- Herramienta avanzada de escaneo XSS (Cross-Site Scripting) para auditorías de seguridad web, con capacidades de evasión de WAF y generaci…☆87Updated last month
- ☆23Updated last month
- tool used to change your IP every second your want☆435Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated 4 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆100Updated 2 years ago
- Security reconnaissance and assessment tool for identifying potentially exposed IP cameras by analyzing open ports, service configuration…☆773Updated last month
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆42Updated 6 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆58Updated 2 weeks ago
- Bookmarklet to find endpoints easily with one click☆75Updated last year
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆84Updated 10 months ago
- Penetration Testing Learning Guide☆129Updated 8 months ago
- Python scripts and tools built during my learning journey☆31Updated 2 months ago
- A quick bug bounty guide for beginners☆89Updated 9 months ago
- Getting Target Browser information by using a URL☆35Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆18Updated 10 months ago
- Lists various tools used in hardware hacking.☆30Updated 2 weeks ago
- ☆243Updated 11 months ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆84Updated 11 months ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆84Updated last year
- Shodan Dorks☆485Updated 11 months ago
- Information Gatherer & Webapps Exploiter☆208Updated last year
- Use AI to install penetration testing tool suites in one click.☆30Updated 4 months ago
- DICMA creates massive wordlists based on specific words for password cracking. To do this, it extracts patterns from dictionaries like ro…☆51Updated 5 months ago
- capNcook - a dark web exploration tool☆87Updated last year
- Swiss army knife of hacking written in Golang, capable of performing various kinds of attacks 🐉☆187Updated 5 months ago
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆163Updated 2 months ago
- WiFi Penetration Testing Guide☆662Updated 2 years ago
- IPGhost is a strong tool for ethical hackers. This tool automatically changes your IP address , making it hard for anyone to track your …☆117Updated 3 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆122Updated 9 years ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆417Updated last year