Scripted Local Linux Enumeration & Privilege Escalation Checks
☆19Mar 26, 2019Updated 6 years ago
Alternatives and similar repositories for LinEnum
Users that are interested in LinEnum are comparing it to the libraries listed below
Sorting:
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Jul 11, 2019Updated 6 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆23Jan 3, 2020Updated 6 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- ☆26Apr 30, 2020Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆62Mar 9, 2019Updated 6 years ago
- ☆22Aug 28, 2025Updated 6 months ago
- ☆85Feb 23, 2020Updated 6 years ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- ☆32May 19, 2022Updated 3 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆214Apr 11, 2020Updated 5 years ago
- ☆67Apr 5, 2022Updated 3 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Search Exploitable Software on Linux☆235Apr 14, 2023Updated 2 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- ☆21May 14, 2017Updated 8 years ago
- ☆17May 29, 2015Updated 10 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 3 years ago
- Tool for password spraying RDP☆98Oct 12, 2018Updated 7 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆28Apr 4, 2025Updated 10 months ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- Lightweight utility to fool port scanners☆32Feb 28, 2020Updated 6 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- AWS Penetration Testing, published by Packt☆33Jan 18, 2023Updated 3 years ago
- ☆33Jan 25, 2021Updated 5 years ago