bcoles / linux-auditLinks
Lazily wraps various Linux system auditing tools
☆18Updated last month
Alternatives and similar repositories for linux-audit
Users that are interested in linux-audit are comparing it to the libraries listed below
Sorting:
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last month
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Updated 5 years ago
- Collection of our CTF write-ups☆28Updated 5 years ago
- ☆13Updated 4 years ago
- Ansible scripts to build an attack box☆25Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- Material from presentations done by GoSecure researchers☆34Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 3 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆47Updated this week
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- ☆12Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Network Traffic Fuzzer☆17Updated 11 months ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆91Updated 3 years ago
- ☆10Updated 7 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 4 years ago