ZephrFish / static-tools
Static compiled binaries + scripts ready to use on systems
☆153Updated 4 years ago
Alternatives and similar repositories for static-tools:
Users that are interested in static-tools are comparing it to the libraries listed below
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆151Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- Windows Pentest Scripts☆229Updated 7 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- Custom tools and projects about security☆110Updated 3 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- locate and attack Lync/Skype for Business☆336Updated 5 months ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- davtest (improved)- Exploits WebDAV folders☆110Updated 2 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 5 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- An LDAP based Active Directory user and group enumeration tool☆308Updated 2 years ago
- Collection of different exploits☆182Updated 4 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆313Updated 3 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆282Updated 3 years ago
- Explore the network using VPNPivot tool☆269Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- unix wildcard attacks☆131Updated 6 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Post Exploitation Wiki☆516Updated 5 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 10 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated 9 months ago