bcoles / linux-audit
Lazily wraps various Linux system auditing tools
☆17Updated last year
Alternatives and similar repositories for linux-audit
Users that are interested in linux-audit are comparing it to the libraries listed below
Sorting:
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- A collection of my public security advisories.☆23Updated 3 weeks ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 4 months ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆10Updated 8 months ago
- ☆22Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Fuzz Network Traffic☆18Updated 4 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago