Scripted Local Linux Enumeration & Privilege Escalation Checks
☆19Mar 26, 2019Updated 6 years ago
Alternatives and similar repositories for LinEnum
Users that are interested in LinEnum are comparing it to the libraries listed below
Sorting:
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Jul 11, 2019Updated 6 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆62Mar 9, 2019Updated 7 years ago
- ☆26Apr 30, 2020Updated 5 years ago
- ☆85Feb 23, 2020Updated 6 years ago
- ☆22Aug 28, 2025Updated 6 months ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- ☆32May 19, 2022Updated 3 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆67Apr 5, 2022Updated 3 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆214Apr 11, 2020Updated 5 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- ☆12Oct 28, 2022Updated 3 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- A t3 Turbo starter with Clerk as the auth provider.☆10Jan 24, 2023Updated 3 years ago
- ☆13Dec 6, 2022Updated 3 years ago
- ☆12Jan 25, 2023Updated 3 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- Search Exploitable Software on Linux☆235Apr 14, 2023Updated 2 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- DriveGit. An adapter between Git and Google Drive so you can horrify people by telling them you store your code in Google Drive.☆12Aug 27, 2023Updated 2 years ago
- ☆12Dec 4, 2023Updated 2 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Turns a list of URLs into hostnames.☆16Feb 9, 2026Updated last month
- ☆33Jan 25, 2021Updated 5 years ago
- bun-next-build☆13Sep 10, 2023Updated 2 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆17May 29, 2015Updated 10 years ago