Whitecat18 / Linux-Attacks
Commands and Scripts to attack Linux and Servers
☆26Updated 7 months ago
Alternatives and similar repositories for Linux-Attacks:
Users that are interested in Linux-Attacks are comparing it to the libraries listed below
- ☆23Updated 4 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆33Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆30Updated 8 months ago
- TP link AC600 Drivers for All Linux distros☆20Updated last year
- Make an Linux Kernel rootkit visible again.☆50Updated last month
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆41Updated last month
- Config files for my GitHub profile.☆12Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆38Updated 3 months ago
- ☆21Updated 10 months ago
- ☆58Updated 6 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆53Updated 2 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 7 months ago
- ☆39Updated last month
- Web Penetration Testing Course Materials☆32Updated 11 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆40Updated 3 weeks ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆27Updated 2 weeks ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 4 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated 11 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- Breaking Active Directory Security with 🍞☆32Updated 4 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 5 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆25Updated last year
- ☆69Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year