StayPirate / t4ubLinks
A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted partition. Useful to grab LUKS passwords.
☆23Updated 4 years ago
Alternatives and similar repositories for t4ub
Users that are interested in t4ub are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Rogue AP killer☆91Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 9 years ago
- ☆15Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Wardriving ekoparty☆15Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 6 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- ☆58Updated 11 years ago
- UPnP hacking scripts and tools☆77Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Phishing SSH Key Passphrases PoC☆17Updated 3 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- ssh session type for metasploit☆101Updated 2 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Updated 2 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Truehunter☆30Updated 4 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago