Simple and accurate guide for linux privilege escalation tactics
☆283Dec 11, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation-Basics
Users that are interested in Linux-Privilege-Escalation-Basics are comparing it to the libraries listed below
Sorting:
- OSCP Privilege Escalation MindMap/Guide☆198Apr 4, 2022Updated 3 years ago
- Simple shell script for automated domain recognition with some tools☆20Mar 9, 2019Updated 6 years ago
- ☆14Feb 15, 2022Updated 4 years ago
- ☆14Apr 9, 2019Updated 6 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- Wordpress Plugin "WP Checkout" Mass exploit☆16Jun 18, 2017Updated 8 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- BLACKBOx Penetration Testing Framework☆31Dec 20, 2018Updated 7 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,842Sep 6, 2023Updated 2 years ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆862Oct 23, 2022Updated 3 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- ☆25Nov 20, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,384Updated this week
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆30Jan 18, 2026Updated last month
- ☆13Nov 30, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,855Dec 25, 2023Updated 2 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- ☆13Dec 24, 2023Updated 2 years ago
- ☆13Apr 8, 2021Updated 4 years ago
- This repository features Zyra, a crypto wallet tool that includes functionality for checking balances using mnemonic seed phrases. It all…☆12Aug 21, 2024Updated last year
- Exploit laravel database config☆10Feb 10, 2019Updated 7 years ago
- Work in progress...☆530Sep 20, 2024Updated last year
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Mar 5, 2020Updated 5 years ago
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50☆25Jan 23, 2023Updated 3 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 7 months ago