bcoles / linux-auditLinks
Lazily wraps various Linux system auditing tools
☆17Updated last year
Alternatives and similar repositories for linux-audit
Users that are interested in linux-audit are comparing it to the libraries listed below
Sorting:
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- A collection of my public security advisories.☆24Updated 2 months ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Research developed by Allele Security Intelligence.☆11Updated 3 months ago
- Fuzz Network Traffic☆18Updated 6 months ago
- Tools for auditing WAFS☆19Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- Directory traversal tool☆10Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 6 months ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 7 months ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- ☆15Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Domain Enrichment Toolkit $ pip install richkit☆11Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆40Updated 5 years ago