b-khan7276 / Linux-Privilege-EscalationLinks
a script designed to help identify vulnerabilities and misconfigurations on a Linux system
☆19Updated 3 years ago
Alternatives and similar repositories for Linux-Privilege-Escalation
Users that are interested in Linux-Privilege-Escalation are comparing it to the libraries listed below
Sorting:
- ☆76Updated 2 years ago
- ☆55Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 9 months ago
- OSCP Cheatsheet by Sai Sathvik☆84Updated 2 years ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆253Updated 6 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆257Updated 9 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆241Updated last year
- A Personal Collection of Infosec Dorks☆208Updated 2 years ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆72Updated 4 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Updated 4 years ago
- ☆242Updated 11 months ago
- My notes while studying for the PNPT from TCM Security.☆82Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- OSCP preparation tools, scripts and cheatsheets☆60Updated 3 years ago
- ☆73Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 11 months ago
- ☆67Updated 3 years ago
- ☆138Updated 4 years ago
- ☆317Updated last year
- ☆86Updated 3 years ago
- Shodan Dorks 2023☆245Updated 11 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆150Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆81Updated last year
- Docker - Ubuntu with a bunch of PenTesting tools and wordlists☆285Updated 10 months ago