ayoul3 / PrivescLinks
Privilege escalation tools on Mainframe
☆83Updated 5 years ago
Alternatives and similar repositories for Privesc
Users that are interested in Privesc are comparing it to the libraries listed below
Sorting:
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆87Updated 4 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- ☆99Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆68Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆55Updated 8 years ago
- ☆41Updated 7 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- Big Iron Recon & Pwnage☆126Updated 3 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- The documents☆56Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Updated 7 years ago
- Search public IP owner through ARIN☆58Updated 2 months ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- ☆19Updated 8 years ago
- A proof of concept for delivering webbugs via AWS lambda☆45Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 8 months ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Updated 4 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆80Updated last year
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- hack400tool☆107Updated 7 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated last year
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year