☆30Jul 8, 2020Updated 5 years ago
Alternatives and similar repositories for Windows-PrivEsc-Tools
Users that are interested in Windows-PrivEsc-Tools are comparing it to the libraries listed below
Sorting:
- ☆26Apr 30, 2020Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆23Jan 3, 2020Updated 6 years ago
- ☆85Feb 23, 2020Updated 6 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆62Mar 9, 2019Updated 6 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Jul 11, 2019Updated 6 years ago
- ☆22Aug 28, 2025Updated 6 months ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆67Apr 5, 2022Updated 3 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- ☆17May 29, 2015Updated 10 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- AWS Penetration Testing, published by Packt☆33Jan 18, 2023Updated 3 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- ☆36Mar 28, 2025Updated 11 months ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- dev backup for main site☆40Jan 3, 2018Updated 8 years ago
- Webshell Jumping Edition☆30May 9, 2017Updated 8 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- Notes, Writeups, and Cheatsheet for eJPT☆29Jun 9, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- ☆92Jun 12, 2025Updated 8 months ago
- ☆11May 17, 2023Updated 2 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago