The-Z-Labs / linux-exploit-suggesterLinks
Linux privilege escalation auditing tool
☆6,274Updated last year
Alternatives and similar repositories for linux-exploit-suggester
Users that are interested in linux-exploit-suggester are comparing it to the libraries listed below
Sorting:
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,701Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,779Updated last year
- Monitor linux processes without root permissions☆5,771Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,147Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,696Updated last week
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,075Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,944Updated 2 years ago
- A swiss army knife for pentesting networks☆8,978Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,740Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,136Updated 3 weeks ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,586Updated last year
- The ultimate WinRM shell for hacking/pentesting☆5,113Updated 2 months ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,522Updated 4 years ago
- Web application fuzzer☆6,339Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,868Updated 4 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,730Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,130Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,790Updated 5 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,530Updated 2 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,131Updated last month
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,326Updated 2 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,008Updated 2 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,520Updated last week
- Weaponized web shell☆3,416Updated last month
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,797Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,915Updated 2 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,661Updated 5 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,391Updated last month
- Privilege Escalation Project - Windows / Linux / Mac☆2,593Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,812Updated this week