Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.
☆18Aug 6, 2021Updated 4 years ago
Alternatives and similar repositories for so-check
Users that are interested in so-check are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lazily wraps various Linux system auditing tools☆20Updated this week
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Various exploits for SerenityOS☆17Oct 29, 2021Updated 4 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- Script which display image (ad) downloaded from the internet.☆13Feb 2, 2020Updated 6 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- Custom Metasploit logos☆54Nov 13, 2021Updated 4 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Work in progress. (Not finished yet) Slim down (GNU) core utils to 64kB, statically linked with minilib.☆15Oct 30, 2023Updated 2 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Updated this week
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- register with termux-api your wifi-stick on your android☆11Dec 18, 2022Updated 3 years ago
- Codes for series☆13Aug 15, 2022Updated 3 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- Spam call (panggilan) untuk mengerjai teman☆22Jul 18, 2022Updated 3 years ago
- op: controlled privilege escalation (a flexible alternative to sudo)☆34Apr 13, 2017Updated 8 years ago
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆10Apr 10, 2021Updated 4 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- personal branch of git://git.suckless.org/ubase☆11Jun 5, 2020Updated 5 years ago
- A tool to uncover hidden SSIDs☆13Apr 17, 2019Updated 6 years ago
- Script for Enumerating SaaS offerings of a specific domain through DNS queries☆50Dec 7, 2022Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- A feature-incomplete peekahole (pahole) clone that doesn't rely on libdwarves (and doesn't choke on Clang output)☆23Oct 23, 2017Updated 8 years ago
- AFL++ with support for FormatFuzzer☆18May 28, 2025Updated 9 months ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Oct 13, 2019Updated 6 years ago
- ☆32May 19, 2022Updated 3 years ago
- Burp Suite DAST Power Tools☆22May 1, 2025Updated 10 months ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago